CompTIA A+ 220-1002 - Prep Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Catherine Halcomb
Catherine Halcomb
Community Contributor
Quizzes Created: 1443 | Total Attempts: 6,714,231
| Attempts: 236 | Questions: 79
Please wait...
Question 1 / 79
0 %
0/100
Score 0/100
1. A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown while providing at least one hour of up-time in case of extreme weather conditions. Which of the following should a technician recommend?

Explanation

A UPS (Uninterruptible Power Supply) is the correct recommendation in this scenario. A UPS provides battery backup power to devices in the event of a power outage or fluctuation. This will prevent file corruption by allowing the devices to shut down properly without losing any data. Additionally, a UPS can provide at least one hour of uptime during extreme weather conditions, ensuring that critical operations can continue even if the power supply is disrupted. Surge protectors, power strips, and power distribution units do not provide the same level of protection and backup power as a UPS.

Submit
Please wait...
About This Quiz
CompTIA A+ 220-1002 - Prep Quiz - Quiz

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. An employee is unable to view in-office network folders while working at home. Which of the following is the MOST likely cause of the problem?

Explanation

An Inactive VPN is the MOST likely item to inhibit a remote worker.

Submit
3. Ann, a user, has purchased a new Android phone and is attempting to access a public hotspot. When she gets a message indicating the page cannot be displayed. She notices there is a "?" in the radio icon in the toolbar. She has verified Bluetooth is active, airplane mode is off, and tethering is turned on. She uses the cell phone to call a technician for assistance. Which of the following is the MOST likely issue Ann is experiencing?

Explanation

Ann is experiencing unauthenticated wireless connectivity. The presence of a "?" in the radio icon suggests that the phone is connected to the public hotspot, but it is not able to authenticate and establish a proper connection. This is why she is unable to access the internet and sees the "page cannot be displayed" message.

Submit
4. Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?

Explanation

*##*SSO (Single-Sign On) is the only option that allows an end-user to enter the same username and password once to use for multiple applications.*##*Permission propagation, Inheritance, and MFA (Multi-Factor Authentication) do not offer this option.

Submit
5. A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have access to only the application needed for customer interaction. The technician must also ensure that whenever the computer is rebooted or powered on it logs on automatically without a password. Which of the following account types would the technician MOST likely set up on this kiosk machine?

Explanation

The Administrator and Power User privilege are too much for these users and Remote Desktop User doesn't apply here. Guest is the most likely option.

Submit
6. Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC?

Explanation

While none of these options are bad, you should not work in a PC still receiving power. That's the absolute first thing to do!

Submit
7. A user’s computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening. Which of the following should the technician attempt NEXT?

Explanation

After restarting the computer and finding that the OS still does not load, the technician should attempt to reboot into safe mode and roll back the updates. This is because the black screen issue could be caused by a recent patch or update that is incompatible with the system. By booting into safe mode, the technician can access the system with minimal drivers and services, allowing them to uninstall or roll back the problematic update. This can potentially resolve the issue and allow the OS to load properly. Repairing the Windows Registry, disabling Windows services and applications, or configuring boot options in the BIOS may not directly address the issue of the OS not loading after a recent update.

Submit
8. A technician is installing the latest OS on a user’s system. The user wants all of the settings and file to remain intact during the installation. Which of the following upgrade methods should the technician use?

Explanation

An in-place upgrade is the appropriate method for the technician to use in this scenario. This method allows the technician to install the latest OS without affecting the user's settings and files. It essentially upgrades the existing OS to the latest version while preserving all the user's data and configurations. This ensures a seamless transition for the user without the need to reconfigure settings or restore files from a backup.

Submit
9. A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom. Which of the following needs to be adjusted on the workstation to fix the issue?

Explanation

Making sure the date and time are correct is how the computer knows if a certificate is expired or not. None of these options would interfere in this process as much as an un-adjusted date and time.

Submit
10. Which of the following is the maximum RAM limit of a Windows 32-bit version?

Explanation

All 32-bit systems have a maximum RAM of 4GBs, often less.

If you're a massive nerd saying " well you can use a PAE (Physical Adddress Extension to access up to 64GBs), that's cool and all but unless you're running Windows Server then any other copy of Windows won't support PAE.

Submit
11. An employee reported that a suspicious individual was looking through the recycle bin. Which of the following types of social engineering threats is this?

Explanation

Dumpster diving is exactly how it sounds. The individual looks in your waste to find material.

Submit
12. A user who is running Windows XP calls a technician to upgrade the computer to a newer Windows OS. The user states the computer has only 1GB of RAM and 16GB of hard drive space with a 1.7GHz processor. Which of the following operating systems should the technician recommended to ensure the BEST performance on this computer?

Explanation

This is a question meant to trick you into thinking it's a specifications issue. Technically, the user's Windows XP machine meets the minimum 32bit requirements for all 4 versions of Windows. However, it says "upgrade" not Clean Install.

 



There is not a direct option to upgrade to Windows 8+. But there is an option to upgrade to Windows 7. The difference between upgrading and a clean install would be the loss of files and settings. 





 


Submit
13. A technician has been asked to recommend antivirus software for a home PC, but the user does not want to pay for a license. Which of the following license type should the technician recommend?

Explanation

An Open License is the only license that is free.

Submit
14. A technician needs to edit a protected .dll file but cannot find the file in the System32 directory. Which of the following Control Panel utilities should the technician use?

Explanation

The technician should use the "Folder Options" utility in the Control Panel. This utility allows the user to customize various settings related to folders and files, including the ability to view and modify protected system files. By enabling the option to show hidden files and folders, the technician will be able to locate and edit the protected .dll file that they need.

Submit
15. A user contacts a technician to troubleshoot server errors. The user explains that some files will not open on the server, the data backups are operational, and the weather has been bad. The technician notices missing time slots in the event log. Which of the following should the technician replace to prevent these issues in the future?

Explanation

If the battery backup went down during an outage, then that would directly explain the missing time and seemingly the corrupted files/backups.

Submit
16. After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked with limiting removable hard drive access to certain network users. USB ports are used for many devices, including scanners, printers, and signature pads, so a policy is created to deny access to removable hard drives only. When testing the policy, a removable drive is plugged in but can still be accessed. Which of the following command-line tools should the technician use to apply the new policy?

Explanation

The question is which CMD tool allows a technician to apply a new policy. The only option here that can do that is gpupdate which stands for for group policy update.

Submit
17. A company brings in contractors several times a year to perform inventory, and the contractors use company-supplied laptops. The company’s security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory. Which of the following BEST enforces this policy?

Explanation

Disabling the user accounts would be the best way to enforce the company's security policy. By disabling the user accounts, the contractors will not be able to log in to the laptops after the inventory is completed, ensuring that they cannot access the laptops until the next inventory. Deleting the user accounts would permanently remove them, which may not be necessary if the contractors will be returning for future inventories. Restricting the user accounts may still allow contractors to log in but with limited access, which does not align with the policy. Resetting the user accounts would only reset the passwords, but the contractors would still be able to log in.

Submit
18. A team needs to deploy a temporary server room at a site to provide support during construction. Which of the following should they use at this site while setting up the server room?

Explanation

During construction, there is likely to be a lot of dust and debris in the air, which can be harmful to the sensitive equipment in a server room. Using air filters at the site will help to remove these particles from the air, ensuring a clean and safe environment for the servers. This will help to prevent any damage or malfunctions that could be caused by the dust and debris. Therefore, air filters are necessary while setting up the temporary server room during construction.

Submit
19. Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time because he has already tried everything that has been suggested. Which of the following should the technician do?

Explanation

The technician should ask more open-ended questions to try and narrow down the issue. By asking specific questions, the technician can gather more information and potentially identify the problem more efficiently. This approach can help save time by avoiding unnecessary troubleshooting steps that have already been tried by the customer. It also shows the technician's commitment to resolving the issue and addressing the customer's concerns.

Submit
20. Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows?

Explanation

Image result for Windows 32 Bit Limit Requirements 4GB
Submit
21. A desktop technician is attempting to upgrade several machines to Windows 10. After releasing there is only one disc for the installation, the technician decides to upgrade over the network. Which of the following boot methods initiates such an upgrade?

Explanation

The correct answer is PXE. PXE stands for Preboot Execution Environment, which is a boot method that allows computers to boot from a network instead of a local storage device like an SSD, optical drive, or flash drive. In this scenario, since the technician only has one disc for the installation, they choose to upgrade over the network using PXE to initiate the upgrade process on multiple machines.

Submit
22. Joe, an end user, has been prompted to provide his username and password to access the payroll system. Which of the following authentication methods is being requested?

Explanation

Any other option besides Single-factor means there is another point asking the end user for authentication or authorization. But since there isn't, then single-factor is the only option.

Submit
23. A user believes there is a virus on a laptop. The user installs additional real-time protection antivirus software but is now experiencing extremely slow performance on the laptop. Which of the following should a technician do to resolve the issue and avoid recurrence?

Explanation

Installing multiple real-time protection antivirus software programs can cause conflicts and slow down the performance of the laptop. Removing the user-installed antivirus software will eliminate any conflicts and improve the performance of the laptop.

Submit
24. Which of the following provide the BEST security for a server room? (Select two.)

Explanation

Compared to the other options, a Badge Reader and Biometric lock would be the most secure. both would identify the specific user and combined, they would make it even harder to gain access.

Submit
25. In which of the following file extension types would a user expect to see the command. "net use T:\\server\files'?

Explanation



"net use" is a command that you would see in a .bat script or more specifically, CMD prompt.Image result for net use .bat
Submit
26. A user's phone contains customer's PII. The user cannot have the phone automatically wiped because the data is very valuable. Which of the following is the BEST method of securing the phone?

Explanation

*##*Fingerprint Locking is the most secure of these 4 options. Biometric security makes it harder while the other options can be brute forced or provide no security.*##*Swipe lock doesn't provide any security.

A PIN can be brute forced easily

A passcode is secure to a point, but it's not as secure as a biometric lock.

Submit
27. A company has hired a new IT firm to manage its network switches and routers. The firm is geographically separated from the company and will need to able to securely access the devices. Which of the following will provide the ability to access these devices?

Explanation

SSH (Secure Shell) is the correct answer because it provides a secure and encrypted method for accessing network devices such as switches and routers. Unlike Telnet, which sends data in clear text, SSH encrypts the data, making it more secure against unauthorized access or eavesdropping. RDP (Remote Desktop Protocol) and VNC (Virtual Network Computing) are used for remote desktop access and control, but they are not typically used for managing network devices. Therefore, SSH is the most appropriate choice for securely accessing the devices in this scenario.

Submit
28. A junior Linux system administrator needs to update system software. Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software?

Explanation

The correct answer is "sudo". The sudo command in Linux allows a user to run programs with the security privileges of another user, typically the superuser or root. By using sudo, the junior Linux system administrator can gain the necessary permissions to update the system software.

Submit
29. Which of the following is considered governmentregulated data?

Explanation

PII, or Personally Identifiable Information, is considered government-regulated data because it refers to any information that can be used to identify an individual, such as their name, social security number, or address. Governments often have regulations in place to protect the privacy and security of PII, as its misuse can lead to identity theft or other forms of harm. Therefore, PII is subject to government regulations and organizations handling such data are required to comply with specific security and privacy standards.

Submit
30. A technician is working at a help-desk form and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in. Which of the following is the BEST choice for the technician to make?

Explanation

You want to perform to the best of your ability while meeting the obligations of your workplace. The best option is to have another technician that is available.

Submit
31. A user's Windows laptop has become consistently slower over time. The technician checks the CPU utilization and sees that it varies between 95% and 100%. After the technician closes some running applications, the CPU utilization drops to approximately 20%, and the laptop runs much faster. The next day the same user calls again with the same problem. Which of the following is a tool the technician can use to resolve the issue?

Explanation

The technician can use Task Manager to resolve the issue. Task Manager allows the technician to view and manage the running processes and applications on the laptop. By closing unnecessary or resource-intensive applications, the technician can reduce the CPU utilization and improve the laptop's performance. However, since the issue persists the next day, there may be underlying factors causing the high CPU utilization that need to be further investigated.

Submit
32. A MAC user's operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC. Which of the following built-in utilities should be used?

Explanation

Image result for Time Machine MAC
Submit
33. Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer's design? (Select two.)

Explanation

UPS (Uninterruptible Power Supply) and server racks are both devices that are commonly used in data centers or server rooms where the grounding of electrical equipment is crucial for safety and proper functioning. UPS devices often have grounding wires to ensure that any electrical faults are safely directed to the ground. Server racks also typically have grounding wires to prevent static electricity buildup and to protect sensitive equipment from electrical surges. On the other hand, desktop printers, patch panels, and modems are not typically designed with grounding wires as they are not as sensitive to electrical issues as UPS and server racks.

Submit
34. A wireless access point is going to be configured in a small office located in a crowded building. Which of the following should the installation technician perform to increase the security of the wireless network? (Select two.)

Explanation

To increase the security of the wireless network in a crowded building, the installation technician should perform two actions. Firstly, reducing the transmit power will limit the range of the wireless signal, making it harder for unauthorized users outside the office to connect to the network. Secondly, disabling the SSID broadcast will prevent the wireless network from being easily detected by potential attackers, as the network name will not be visible in the list of available networks. These two measures together help to minimize the chances of unauthorized access and enhance the overall security of the wireless network.

Submit
35. Which of the following technologies is used by malicious employees to obtain user passwords?

Explanation

Shoulder surfing is a technique used by malicious employees to obtain user passwords. It involves the act of looking over someone's shoulder while they are entering their password, in order to gain unauthorized access to their accounts. This method allows the malicious employee to easily observe and memorize the password without the victim's knowledge. It is a form of social engineering attack that exploits human vulnerabilities and lack of awareness about the surroundings.

Submit
36. A SOHO user reports desktop applications are performing slowly, and no emails have been received all morning. A technician remotes in and determines Internet pages' load slowly or not at all, CPU performance is normal, and the local router can successfully ping. The remote connection drops periodically. Which of the following steps should the technician take NEXT to resolve the problem?

Explanation

*##*Updating the antivirus software, running a scan, verifying the browser settings are correct along with the hosts file and checking all email settings will provide a better resolution to the problem than changing more settings.*##*What's being described here is a connection issue. Modifying the BIOS and changing the OS is a leap but also not relevant to the immediate issue of the internet. The technician found nothing wrong with the CPU, only slow loading pages and periodic connections dropped.

Sending a test email, running a file system check, and emptying the browser cache isn't necessarily wrong but doesn't seem like something that will resolve the problem.

Submit
37. A technician has just finished installing a secondary OS on a workstation. After rebooting the computer, the technician receives the following error: No OS found. The technician confirms the boot.ini file is correct. Which of the following is MOST likely causing this error?

Explanation

An incompatible partition being marked as active is the most likely cause of the error "No OS found" after installing a secondary OS. When a partition is marked as active, the computer looks for an operating system in that partition during boot. If the partition contains an incompatible OS or no OS at all, the error message is displayed. In this case, the technician has confirmed that the boot.ini file is correct, ruling out other potential causes such as GRUB Legacy, Windows Startup services, or an unsupported version of Windows.

Submit
38. Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the memory, power supply, and monitor are all working. The technician runs internal diagnostics on the PC, but the hard drive is not recognized. Which of the following messages will be displayed?

Explanation

The message "No boot device available" will be displayed. This message indicates that the computer is unable to find any device from which it can boot the operating system. Since the hard drive is not recognized, the computer cannot access the necessary files to start up. This could be due to a faulty hard drive or a problem with the connection between the hard drive and the motherboard.

Submit
39. A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server. Which of the following Control Panel utilities should the technician use to configure the setting?

Explanation

Image result for Internet Options – ConnectionsImage result for internet options proxy settings
Submit
40. Joe, a systems administrator, is setting up a risk management plan for the IT department. Part of the plan is to take daily backups of all servers. The server backups will be saved locally to NAS. Which of the following can Joe do to ensure the backups will work if needed?

Explanation

Joe can set up alerts to let administrators know when backups fail in order to ensure that the backups will work if needed. This will allow the administrators to take immediate action and address any issues or errors with the backups, ensuring that they are functioning properly and can be relied upon for recovery if necessary. By being alerted to backup failures, the IT department can promptly troubleshoot and resolve any problems, minimizing the risk of data loss and maximizing the effectiveness of the backup plan.

Submit
41. A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources. Which of the following protocols and authentication methods should the technician implement? (Select two.)

Explanation

Of all these options, WPA2 on a SOHO router is the most secure. Combined with Multifactor Authentication, it meets all the needs of the user.

And before you ask...RADIUS is for remote users and TACACS is an outdated alternative to Radius.

Submit
42. A technician is PXE booting a computer. Which of the following is the technician MOST likely performing on the computer?

Explanation

The technician is most likely performing image deployment on the computer. PXE booting is a method that allows a computer to boot from a network instead of a local hard drive. This is commonly used for deploying operating system images to multiple computers simultaneously. Therefore, the technician is likely using PXE booting to deploy an image onto the computer.

Submit
43. A user’s mobile device appears to be losing battery life rapidly and often feels warm to the touch, even when it is put away. The device is relatively new, so the user is concerned it is defective. A technician inspects the device and see the following: Which of the following should be changed to resolve this issue?

Explanation

The correct answer is Display - Brightness. The user's mobile device is losing battery life rapidly and feeling warm to the touch, which indicates that the display brightness may be set too high. Higher display brightness consumes more battery power and generates more heat. By reducing the display brightness, the device will consume less power and generate less heat, thereby resolving the issue.

Submit
44. With which of the following types is a man-in-the-middle attack associated?

Explanation

A MITM attack is done using spoofing to mask the attacker as someone trusted.

Submit
45. A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission. If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns?

Explanation

The correct answer is "Power Levels" because by adjusting the power levels of the wireless network, the small business can limit the range of the network signal. This will make it more difficult for the nearby company to connect and use the wireless connection without permission. By reducing the power levels, the network signal will be weaker and have a shorter range, making it more localized to the small business premises.

Submit
46. A technician is working on a Windows 10 PC that is running slowly. Which of the following commands should the technician use to correct this issue? (Select two.)

Explanation

chkdsk is short for "Check Disk" and dism stands for "Deployment Image Servicing and Management"

• Dir would show a targeted directory and folders within
• Ipconfig would show the ip configuration for that device
• Format would format a disk
• diskpart would create a disk partition

Of these choices, chkdsk and dism are the only two that perform some measure of troubleshooting tasks related to the mentioned issue.

Submit
47. A technician has identified malware on a user's system. Which of the following should the technician do NEXT according to malware removal best practices?

Explanation


  1. Identify malware symptoms. << Technician DID THIS

  2. Quarantine infected systems. << THIS IS what the Technician should do next.

  3. Disable System Restore.

  4. Re-mediate: Update antivirus.

  5. Re-mediate: Scan and remove.

  6. Schedule scans and run updates.

  7. Educate the end user.




"Im the Quirky Dr. of the USS Enterprise"
Submit
48. A network administrator has given a technician documentation detailing the switch-ports the technician will need to patch in for a network upgrade. Which of the following documents did the network administrator MOST likely give to the technician?

Explanation

The network administrator most likely gave the technician a physical network diagram. This diagram provides a visual representation of the physical layout of the network, including the switch-ports that need to be patched in for the network upgrade. It shows the physical connections between devices, such as switches, routers, and servers, and helps the technician understand how to physically connect the network components. The other options, such as process diagram, fiber backbone diagram, and logical topology diagram, do not specifically provide information about the switch-ports and their physical connections.

Submit
49. A user's smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures. Which of the following steps should be taken FIRST to determine the cause of the issue?

Explanation

To determine the cause of the issue, the first step should be to check the application permissions. This is because the camera shutter noise may be triggered by an application that has been granted permission to access the camera even when the user is not actively using it. By checking the application permissions, the user can identify if any application has such access and disable it if necessary. This step will help narrow down the cause of the issue and potentially resolve it without the need for more drastic measures like uninstalling the camera application or resetting the phone to factory settings.

Submit
50. A network administrator wants to plan a major OS upgrade of the router, which acts as a default gateway in an organization. The administrator has documented the purpose of the change, scoped the change, and completed a comprehensive risk analysis. Which of the following is an important part of the change request process for which the administrator still must plan?

Explanation

The network administrator must plan to document a backout plan to roll back changes to the router. This is important because even with thorough planning and risk analysis, there is always a possibility that the OS upgrade may cause unforeseen issues or disruptions to the network. Having a backout plan in place ensures that if any problems arise during or after the upgrade, the administrator can revert the changes and restore the previous functioning state of the router. This helps to minimize downtime and potential impact on the organization's network operations.

Submit
51. Which of the following features has undergone the most significant changes from Windows 7 to Windows 10 and greatly simplified the operating system installation process?

Explanation

The feature that has undergone the most significant changes from Windows 7 to Windows 10 and greatly simplified the operating system installation process is driver detection. In Windows 10, the operating system has improved driver compatibility and the ability to automatically detect and install drivers for hardware devices, reducing the need for manual driver installation and making the overall installation process more streamlined and user-friendly.

Submit
52. Which of the following devices provides protection against brownouts?

Explanation

*##*Most battery backups usually have a built in Surge Suppressor/Protector. And would be the most effective with dips in power such as brownouts.*##*Any option besides Battery Backup won't help against brownouts.

Submit
53. A user calls the help desk regarding a new Windows issues that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem. Which of the following would MOST likely fix the issue?

Explanation

Rolling back updates would most likely fix the issue because the problem started after the updates were installed. By rolling back the updates, the system will revert to the previous state before the updates were installed, potentially resolving any compatibility issues or bugs that were introduced with the updates.

Submit
54. A manager requests remote access to a server after hours and on weekends to check data. The manager insists on using the server. Before granting the access, which of the following is the MOST important step a technician can take to protect against possible infection?

Explanation

The most important step a technician can take to protect against possible infection is to ensure that the server is patched with the latest security updates. Patching the server with the latest security updates helps to fix any known vulnerabilities or weaknesses in the server's software, making it less susceptible to attacks or infections. This is crucial in maintaining the server's security and protecting it from potential threats, especially when granting remote access to a manager who will be accessing the server after hours and on weekends.

Submit
55. A client wants a technician to create a PC naming convention that will make the client's PCs easier to track and identify while in use. Which of the following naming convention formats should the technician follow?

Explanation

If the naming convention includes a location or IP address, that would be compromising. Option B would be the easiest and individually identifying.

Submit
56. An administrator is setting up a Windows terminal server. Which of the following settings should the administrator modify to increase server security? (Select two.)

Explanation

Putting the terminal server into the router's DMZ and blocking all unused ports on the LAN smart Switch are the most secure options of these five. The DMZ will help block outside access and blocking unused ports allows security measures to focus on active ports, limiting the options for malicious users.

All these options are good, but if you're only going to select two then restricting logon time and enforcing password complexity would only restrict users and make it tougher for a password to be figured out. But after the hacker uses one of many methods to find the password to an admin's account. What is to stop the hacker or at least make it difficult to prevent them from connecting from the outside in the first place?

If you change the default access port, this wouldn't necessarily increase security, just make it more difficult. Same using a local client certificate for server authentication. It's a good option, but that means the device must be connected locally to gain authentication. If the malicious party is already onsite, your server is compromised.

Submit
57. Computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring. Which of the following would BEST accomplish this goal?

Explanation

not-available-via-ai

Submit
58. Which of the following threats uses personalized information in an attempt at obtaining information?

Explanation

*##*Spear phishing is the fraudulent practice of sending emails ostensibly from a known or trusted sender in order to induce targeted individuals to reveal confidential information. The key to Spear phishing is that it utilizes that personalized data to entice a target.

If you subscribe to a coupon list from your favorite online store and the attacker gains this information. They could send you a fake email as that online store. Mimicking their typical email format, a bank statement, a newsletter, a discount email, a special offer...and then ask you to click a special link.
*##*A whaling attack, also known as whaling phishing or a whaling phishing attack, is a specific type of phishing attack that targets high-profile employees, such as the CEO or CFO, in order to steal sensitive information from a company.

Impersonation attacks are emails that attempt to impersonate a trusted individual or company in an attempt to gain access to corporate finances or data.

Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server.

Submit
59. A technician is installing a private PC in a public workspace. Which of the following password practices should the technician implement on the PC to secure network access?

Explanation

This one might be designed to trick you. By default, a guest account won't be in the administrators group. Disabling single sign-on is not going to secure network access. And issuing a default strong password for all users is a good second choice, however, requiring authentication on wake-up would be the most detrimental in a public setting.

Consider this: If the end-user is walking away constantly in this public space, enabling or disabling any other option won't stop a malicious individual from walking up to the PC and then walking away. Unless the user locks their PC and it requires password authentication to wake-up.

Submit
60. Technician is recycling PCs to be reused by a middle school. Which of the following methods is MOST appropriate for ensuring data has been removed from the PCs?

Explanation

Low-level formatting is the most appropriate method for ensuring data has been removed from the PCs. This process involves overwriting the entire hard drive with zeros or random data, effectively erasing all previous data and making it difficult to recover. Standard formatting only removes the file allocation table and does not completely erase the data. HD drilling physically destroys the hard drive, which may not be necessary for recycling purposes. HD partitioning divides the hard drive into sections but does not guarantee complete data removal.

Submit
61. An end user's PC is taking a long time to boot. Which of the following operations would be the BEST to resolve this issue with minimal expense? (Select two.)

Explanation

Removing applications from startup can help improve boot time by reducing the number of programs that need to load during startup. This can be done by accessing the startup folder or using the system configuration utility to disable unnecessary startup programs.

Defragmenting the hard drive can also help improve boot time by organizing fragmented files and optimizing the disk's performance. This can be done using the built-in Disk Defragmenter tool or third-party defragmentation software.

Submit
62. A technician is running updates on a Windows PC. Some of the updates install properly, while others appear as failed. While troubleshooting, the technician restarts the PC and attempts to install the failed updates again. The updates continue to fail. Which of the following is the FIRST option to check?

Explanation

When there is an error inside the Windows Update process there is typically a code delivered with the error that allows users o research that specific error.



Visiting the Microsoft Update Website might be the most informal task as you would likely run into Forums or notices but not an actual fix, unless it's a manual workaround. And what information would be used in your search?



If you look at the Event Viewer it would likely supply you with the same error number and when it occurred but not why and how to fix it. So, you will be in the same spot you started.



Manually doing the same task would likely not work.



Instead, if you look up the error number; Microsoft would likely have documentation on what, where, and why. When you look up an error it will take you in the direct path of Microsoft's fix and requirements. 



Image result for Look up the error number associated with the failed update



Like reaching into an active Appendix, Microsoft will tell you why or what is causing the issue and tell you what to do next or why it did this. The below example is one such scenario:

If an update meant to fix an error is installed before the update that caused the error. You will get an error that was supposed to be fixed. (I'm not saying this is what that update does, it's a scenario).



In the sequence that happens next, it could detail the options in the correct order.



Find Error Number > Look at Event Viewer to find more information on that failure >  Then Visit the Microsoft Update site to see that specific update > Uninstall that last update > And  then install the failed update manually.

Image result for Look up the error number associated with the failed update

Submit
63. A manager with a restricted user account receives the following error message: Windows Update cannot currently check for updates because the service is not running. The manager contacts the help desk to report the error. A technician remotely connects to the user's computer and identifies the problem. Which of the following should the technician do NEXT?

Explanation

The technician should restart the network services. This error message indicates that the Windows Update service is not running, which could be due to a network connectivity issue. By restarting the network services, the technician can ensure that the necessary network connections are established and the Windows Update service can function properly. Rebooting the computer may not resolve the underlying network issue, so it is not the best next step. Rolling back device drivers or rebuilding Windows profiles are unrelated to the network services and would not address the problem.

Submit
64. A SOHO customer has recently experienced a major hurricane. The customer has no backups and has lost all data and hardware associated with the company. The customer calls a contractor to assist in the rebuilding process and needs suggestions on the best way to prevent this from happening again. Which of the following recommendations should the contractor give to the customer? (Select two.)

Explanation

The contractor should recommend cloud storage as one of the solutions to prevent data loss in the future. Cloud storage allows the customer to store their data remotely, ensuring that even if their hardware is damaged or destroyed, their data will still be accessible. Additionally, the contractor should suggest setting up a hot site, which is a duplicate of the customer's IT infrastructure located in a different geographical area. This way, if the main site is affected by a disaster, the hot site can be activated to ensure business continuity.

Submit
65. A technician arrives on site to find that two users who have the same model on Android smartphone are having the same issue with a specific application.   Whenever they attempt to launch the application, it fails and gives an error message. Which of the following should the technician do FIRST?

Explanation

The technician should first update the OS of the smartphones. Since both users are experiencing the same issue with the specific application, it is likely that the issue is caused by an outdated operating system. Updating the OS can help resolve any compatibility issues and ensure that the application runs smoothly. Clearing the application cache, rolling back the application, or reinstalling the application may not address the root cause of the problem. Therefore, updating the OS is the best first step to take in this situation.

Submit
66. Joe, an employee, took a company-issued Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server. Joe has verified he is connected to the Internet. Which of the following would explain why Joe cannot access his personal shares?

Explanation

Joe cannot access his personal shares because a firewall exception must be set. This means that the firewall on Joe's company-issued Windows laptop is blocking the connection to his home media server. By setting a firewall exception, Joe can allow the necessary network traffic to pass through the firewall and access his personal shares.

Submit
67. A Windows user is attempting to install a local printer and is unsuccessful on permissions. Which of the following user types BEST describes this user?

Explanation

A guest user is a user type that has limited permissions and access rights on a Windows system. They do not have the necessary privileges to install local printers or make system-level changes. Therefore, it is likely that the Windows user in question is a guest user, which explains their inability to successfully install the local printer due to permissions restrictions.

Submit
68. A technician is installing Windows 7 64-bit OS on a VM but keeps getting errors. The specifications for the malware are: Two 1GHz CPUs, 2GB of memory, 15GB hard drive, 800x600 screen resolution. Which of the following should the technician do to resolve the problem?

Explanation

To resolve the problem, the technician should increase the amount of hard drive space. The errors that the technician is encountering during the installation of Windows 7 64-bit OS on a VM may be due to insufficient hard drive space. Increasing the hard drive space will provide enough storage for the operating system and any additional software or files that may be installed, allowing the installation process to proceed without errors. Increasing the number of CPUs, amount of memory, or screen resolution would not directly address the issue of installation errors.

Submit
69. Ann, a user, is attempting to log in to her email service form a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid. Ann then decides to reset her email password, but after the reset, the new credentials still do not work in the third-party email client. Which of the following settings or features is responsible for the problems Ann is experiencing?

Explanation

The problem Ann is experiencing is likely due to multi-factor authentication. Multi-factor authentication adds an extra layer of security by requiring users to provide multiple forms of verification, such as a password and a unique code sent to their phone. Since Ann is using a third-party email client, it may not support multi-factor authentication, causing her credentials to be invalid. Resetting her email password would not resolve the issue because the third-party email client still does not support multi-factor authentication.

Submit
70. A SOHO technician recently moved some data from one server to another to increase storage capacity. Several users are now reporting they cannot access certain shares on the network. When the users attempt to access the shares, they get the following error: "Access Denied". The technician confirms the users are all in the proper security groups and have the proper access, but they are still unable to access the shares. Which of the following are the MOST likely reasons for these issues? (Select two.)

Explanation

The technician moved the data to another server that needs be remapped and also modified to make sure the permissions enable the end-users to access the data properly.

Submit
71. An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is running slowly, even while not browsing the internet. Which of the following actions should the user take?

Explanation

The user should install anti-malware software. The symptoms described in the question, such as multiple browser pages opening by themselves and the PC running slowly, indicate that the user's computer may be infected with malware. Anti-malware software is designed to detect and remove malicious software from a computer system, which can help improve performance and prevent further issues. Updating antivirus definitions and enabling the pop-up blocker may provide some protection, but installing anti-malware software is the most effective solution in this situation. Rebooting the PC may temporarily resolve the issue, but it won't address the underlying malware problem.

Submit
72. A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the business’s concerns. Which of the following configuration settings should the technician change to satisfy the requirements of the business? (Select two.)

Explanation

The technician should change the MAC filtering and signal strength settings to satisfy the requirements of the business. MAC filtering allows the network to only accept connections from devices with specific MAC addresses, ensuring that only authorized devices can connect. By enabling MAC filtering, the technician can prevent customers from connecting to the access point. Adjusting the signal strength can limit the range of the WiFi network, making it less likely for customers outside of the business to detect and connect to the network.

Submit
73. Ann, a user, calls the help desk regarding an issue on her laptop. While working remotely, she appears to be connecting to WiFi but is unable to retrieve her corporate email. The wireless name is listed as "ConnectMe" and appears as un-secure. Which of the following should the help desk perform to fix the issue?

Explanation

While she shouldn't try to access corporate emails without a VPN, common public access wifi networks keep their networks unsecure but when you connect to their internet your browser will be forced to go to a redirect page in order to register with that network properly. Until Ann does this, she will not be able to have internet access.

Submit
74. A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately. With which of the following types of infections are the PCs MOST likely infected? (Select two.)

Explanation

The PCs are most likely infected with Zombies and Worms. Zombies are infected computers that are controlled remotely by an attacker and used to launch DDoS attacks. Worms are self-replicating malware that can spread across a network and infect multiple computers, which aligns with the scenario of multiple internal Windows PCs being the source of the traffic. Both Zombies and Worms can be used as part of a botnet, but the question specifically asks for the types of infections, so Botnet is not a correct answer on its own.

Submit
75. A small office's wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network. Which of the following configurations MOST likely allowed the attack to take place? (Select two.)

Explanation

The default login configuration likely allowed the attack to take place because the attacker was able to gain access to the router using the default login credentials. Additionally, the WEP configuration also likely allowed the attack to take place because WEP is an outdated and weak encryption method that can be easily cracked by attackers.

Submit
76. A technician is working on a user’s workstation and notices a lot of unknown processes running in the background. The user informs the technician that an application was recently downloaded from the Internet. Which of the following types of infection does the user MOST likely have?

Explanation

The user most likely has a rootkit infection. Rootkits are malicious software that are designed to hide themselves and other malicious processes from detection. They often gain access to a system through downloaded applications from the internet. The presence of unknown processes running in the background is a common sign of a rootkit infection.

Submit
77. A security team is auditing a company’s network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information. Which of the following actions should be taken to close the vulnerability? (Select two.)

Explanation

The correct answer is to disable the guest account and modify AutoRun settings. By disabling the guest account, unauthorized individuals will not be able to gain access to the servers using common login information. Modifying AutoRun settings will prevent any malicious code from being automatically executed when a USB drive is inserted into the servers, reducing the risk of further exploitation. Removing admin permissions, changing default credentials, and running OS security may also be important security measures, but they are not directly related to closing the vulnerability caused by the USB drive insertion and successful login attempts.

Submit
78. Ann, an employee at a company, calls the help disk to report issues logging on to a vendor's website. Joe, the technician, is able to log in successfully with his credentials before going to Ann's office. However, when he attempts to log in from Ann's office, Joe experiences the same issue. Ann asks Joe questions about the new software installed on the laptop from the pop-up notification. Which of the following are the NEXT steps Joe should take to resolve the issue? (Select two.)

Explanation

Joe should first check all browser cached files on Ann's laptop and log on to another vendor's website. This will help determine if the issue is specific to the vendor's website or if it is a general problem with the browser or laptop. Additionally, Joe should ask Ann about the notification and review the installed programs. This will provide insights into any recent changes or updates that may be causing the login issue. By taking these steps, Joe can gather more information and troubleshoot the problem effectively.

Submit
79. A project team is organized to implement a new wireless solution for a school. The team has already done the network diagrams and knows the locations that will need to be addressed in the project. The team is in the process of creating an SOW for the project as a whole and needs to add the critical pieces to the SOW to complete it and move to the next stage. Which of the following would the project team MOST likely add to the SOW?

Explanation

A statement of work (SOW) can be perceived as the same thing as a "Plan to Change". And you should have a Risk analysis before you have a back-out plan so you know what to backup for. And you're not going to ask a Board to approve something without a back out plan and a risk analysis.



Risk Analysis is the answer!



Submit
View My Results

Quiz Review Timeline (Updated): Oct 11, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Oct 11, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 11, 2020
    Quiz Created by
    Catherine Halcomb
Cancel
  • All
    All (79)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
A user is requesting a solution that will prevent file corruption and...
An employee is unable to view in-office network folders while working...
Ann, a user, has purchased a new Android phone and is attempting to...
Which of the following security methods BEST describes when a user...
A technician is setting up a kiosk. The technician needs to ensure the...
Which of the following steps should a technician take FIRST to prevent...
A user’s computer is displaying a black screen. The technician...
A technician is installing the latest OS on a user’s system. The...
A technician receives an invalid certificate error when visiting a...
Which of the following is the maximum RAM limit of a...
An employee reported that a suspicious individual was looking through...
A user who is running Windows XP calls a technician to upgrade the...
A technician has been asked to recommend antivirus software for a home...
A technician needs to edit a protected .dll file but cannot find the...
A user contacts a technician to troubleshoot server errors. The user...
After a virus has been spread unknowingly via USB removable hard...
A company brings in contractors several times a year to perform...
A team needs to deploy a temporary server room at a site to provide...
Joe, a customer, has informed a Tier 2 help desk technician that a...
Which of the following is the amount of memory a user is limited to...
A desktop technician is attempting to upgrade several machines to...
Joe, an end user, has been prompted to provide his username and...
A user believes there is a virus on a laptop. The user installs...
Which of the following provide the BEST security for a server room?...
In which of the following file extension types would a user expect to...
A user's phone contains customer's PII. The user cannot have the phone...
A company has hired a new IT firm to manage its network switches and...
A junior Linux system administrator needs to update system software....
Which of the following is considered governmentregulated data?
A technician is working at a help-desk form and receives a call from a...
A user's Windows laptop has become consistently slower over time. The...
A MAC user's operating system became corrupted, and files were deleted...
Which of the following devices are MOST likely to have a grounding...
A wireless access point is going to be configured in a small office...
Which of the following technologies is used by malicious employees to...
A SOHO user reports desktop applications are performing slowly, and no...
A technician has just finished installing a secondary OS on a...
Ann, a user, calls a technician and reports that her PC will not boot....
A department in an organization set up a proxy server to manage its...
Joe, a systems administrator, is setting up a risk management plan for...
A technician is setting up a SOHO wireless network for a healthcare...
A technician is PXE booting a computer. Which of the following is the...
A user’s mobile device appears to be losing battery life rapidly and...
With which of the following types is a man-in-the-middle attack...
A small business has an open wireless network so vendors can connect...
A technician is working on a Windows 10 PC that is running slowly. ...
A technician has identified malware on a user's system. Which of the...
A network administrator has given a technician documentation detailing...
A user's smartphone is making the camera shutter noise even when the...
A network administrator wants to plan a major OS upgrade of the...
Which of the following features has undergone the most significant...
Which of the following devices provides protection against...
A user calls the help desk regarding a new Windows issues that started...
A manager requests remote access to a server after hours and on...
A client wants a technician to create a PC naming convention that will...
An administrator is setting up a Windows terminal server. Which of the...
Computer becomes infected with malware, which manages to steal all...
Which of the following threats uses personalized information in an...
A technician is installing a private PC in a public workspace. Which...
Technician is recycling PCs to be reused by a middle school....
An end user's PC is taking a long time to boot. Which of the following...
A technician is running updates on a Windows PC. Some of the updates...
A manager with a restricted user account receives the following error...
A SOHO customer has recently experienced a major hurricane. The...
A technician arrives on site to find that two users who have the same...
Joe, an employee, took a company-issued Windows laptop home, but is...
A Windows user is attempting to install a local printer and is...
A technician is installing Windows 7 64-bit OS on a VM but keeps...
Ann, a user, is attempting to log in to her email service form a...
A SOHO technician recently moved some data from one server to another...
An end user is browsing the Internet when multiple browser pages open...
A small business has an open WiFi network for employees but does not...
Ann, a user, calls the help desk regarding an issue on her laptop....
A network administrator notifies a technician that the company is...
A small office's wireless network was compromised recently by an...
A technician is working on a user’s workstation and notices a lot of...
A security team is auditing a company’s network logs and notices...
Ann, an employee at a company, calls the help disk to report issues...
A project team is organized to implement a new wireless solution for a...
Alert!

Advertisement