CompTIA A+ 220-1002 - Prep Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Catherine Halcomb
C
Catherine Halcomb
Community Contributor
Quizzes Created: 1428 | Total Attempts: 5,961,110
Questions: 79 | Attempts: 208

SettingsSettingsSettings
CompTIA A+ 220-1002 - Prep Quiz - Quiz


Questions and Answers
  • 1. 

    A technician arrives on site to find that two users who have the same model on Android smartphone are having the same issue with a specific application. Whenever they attempt to launch the application, it fails and gives an error message. Which of the following should the technician do FIRST?

    • A.

      Update the OS of the smartphones

    • B.

      Clear the application cache

    • C.

      Roll back the application to the earlier version

    • D.

      Reinstall the application

    Correct Answer
    A. Update the OS of the smartphones
    Explanation
    The technician should first update the OS of the smartphones. Since both users are experiencing the same issue with the specific application, it is likely that the issue is caused by an outdated operating system. Updating the OS can help resolve any compatibility issues and ensure that the application runs smoothly. Clearing the application cache, rolling back the application, or reinstalling the application may not address the root cause of the problem. Therefore, updating the OS is the best first step to take in this situation.

    Rate this question:

  • 2. 

    A technician is working on a Windows 10 PC that is running slowly. Which of the following commands should the technician use to correct this issue? (Select two.)

    • A.

      Dir

    • B.

      Chkdsk

    • C.

      Dism

    • D.

      Ipconfig

    • E.

      Format

    • F.

      Diskpart

    Correct Answer(s)
    B. Chkdsk
    C. Dism
    Explanation
    chkdsk is short for "Check Disk" and dism stands for "Deployment Image Servicing and Management"

    • Dir would show a targeted directory and folders within
    • Ipconfig would show the ip configuration for that device
    • Format would format a disk
    • diskpart would create a disk partition

    Of these choices, chkdsk and dism are the only two that perform some measure of troubleshooting tasks related to the mentioned issue.

    Rate this question:

  • 3. 

    An administrator is setting up a Windows terminal server. Which of the following settings should the administrator modify to increase server security? (Select two.)

    • A.

      Change the default access port.

    • B.

      Enforce password complexity

    • C.

      Put the terminal server into the router’s DMZ

    • D.

      Block all unused ports on the LAN smart switch

    • E.

      Use the local client certificate for server authentication

    • F.

      Disable logon time restrictions

    Correct Answer(s)
    C. Put the terminal server into the router’s DMZ
    D. Block all unused ports on the LAN smart switch
    Explanation
    Putting the terminal server into the router's DMZ and blocking all unused ports on the LAN smart Switch are the most secure options of these five. The DMZ will help block outside access and blocking unused ports allows security measures to focus on active ports, limiting the options for malicious users.

    All these options are good, but if you're only going to select two then restricting logon time and enforcing password complexity would only restrict users and make it tougher for a password to be figured out. But after the hacker uses one of many methods to find the password to an admin's account. What is to stop the hacker or at least make it difficult to prevent them from connecting from the outside in the first place?

    If you change the default access port, this wouldn't necessarily increase security, just make it more difficult. Same using a local client certificate for server authentication. It's a good option, but that means the device must be connected locally to gain authentication. If the malicious party is already onsite, your server is compromised.

    Rate this question:

  • 4. 

    A company has hired a new IT firm to manage its network switches and routers. The firm is geographically separated from the company and will need to able to securely access the devices. Which of the following will provide the ability to access these devices?

    • A.

      Telnet

    • B.

      SSH

    • C.

      RDP

    • D.

      VNC

    Correct Answer
    B. SSH
    Explanation
    SSH (Secure Shell) is the correct answer because it provides a secure and encrypted method for accessing network devices such as switches and routers. Unlike Telnet, which sends data in clear text, SSH encrypts the data, making it more secure against unauthorized access or eavesdropping. RDP (Remote Desktop Protocol) and VNC (Virtual Network Computing) are used for remote desktop access and control, but they are not typically used for managing network devices. Therefore, SSH is the most appropriate choice for securely accessing the devices in this scenario.

    Rate this question:

  • 5. 

    A small office’s wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network. Which of the following configurations MOST likely allowed the attack to take place? (Select two.)

    • A.

      Guest network

    • B.

      TKIP

    • C.

      Default login

    • D.

      Outdated firmware

    • E.

      WPS

    • F.

      WEP

    Correct Answer(s)
    C. Default login
    F. WEP
    Explanation
    The default login configuration likely allowed the attack to take place because the attacker was able to gain access to the router using the default login credentials. Additionally, the WEP configuration also likely allowed the attack to take place because WEP is an outdated and weak encryption method that can be easily cracked by attackers.

    Rate this question:

  • 6. 

    A client wants a technician to create a PC naming convention that will make the client’s PCs easier to track and identify while in use. Which of the following naming convention formats should the technician follow?

    • A.

      Domain name, location, IP address

    • B.

      Asset ID, MAC address

    • C.

      Domain name, location, asset ID

    • D.

      Location, RFID

    Correct Answer
    B. Asset ID, MAC address
    Explanation
    If the naming convention includes a location or IP address, that would be compromising. Option B would be the easiest and individually identifying.

    Rate this question:

  • 7. 

    Which of the following provide the BEST security for a server room? (Select two.)

    • A.

      Bollard

    • B.

      Badge reader

    • C.

      Cable lock

    • D.

      Biometric lock

    • E.

      Privacy window shades

    • F.

      USB token

    Correct Answer(s)
    B. Badge reader
    D. Biometric lock
    Explanation
    Compared to the other options, a Badge Reader and Biometric lock would be the most secure. both would identify the specific user and combined, they would make it even harder to gain access.

    Rate this question:

  • 8. 

    Which of the following threats uses personalized information in an attempt at obtaining information?

    • A.

      Whaling

    • B.

      Impersonation

    • C.

      Spoofing

    • D.

      Spear phishing

    Correct Answer
    D. Spear phishing
    Explanation
    *##*Spear phishing is the fraudulent practice of sending emails ostensibly from a known or trusted sender in order to induce targeted individuals to reveal confidential information. The key to Spear phishing is that it utilizes that personalized data to entice a target.

    If you subscribe to a coupon list from your favorite online store and the attacker gains this information. They could send you a fake email as that online store. Mimicking their typical email format, a bank statement, a newsletter, a discount email, a special offer...and then ask you to click a special link.
    *##*A whaling attack, also known as whaling phishing or a whaling phishing attack, is a specific type of phishing attack that targets high-profile employees, such as the CEO or CFO, in order to steal sensitive information from a company.

    Impersonation attacks are emails that attempt to impersonate a trusted individual or company in an attempt to gain access to corporate finances or data.

    Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server.

    Rate this question:

  • 9. 

    A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom. Which of the following needs to be adjusted on the workstation to fix the issue?

    • A.

      Logon times

    • B.

      User access control

    • C.

      Date and time

    • D.

      UEFI boot mode

    Correct Answer
    C. Date and time
    Explanation
    Making sure the date and time are correct is how the computer knows if a certificate is expired or not. None of these options would interfere in this process as much as an un-adjusted date and time.

    Rate this question:

  • 10. 

    A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server. Which of the following Control Panel utilities should the technician use to configure the setting?

    • A.

      Internet Options – Advanced

    • B.

      Internet Options – Security

    • C.

      Internet Options – Content

    • D.

      Internet Options – Connections

    • E.

      Internet Options – Privacy

    Correct Answer
    D. Internet Options – Connections
  • 11. 

    Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows?

    • A.

      2GB

    • B.

      4GB

    • C.

      8GB

    • D.

      16GB

    Correct Answer
    B. 4GB
  • 12. 

    A technician is working at a help-desk form and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in. Which of the following is the BEST choice for the technician to make?

    • A.

      Politely ask the user to call back

    • B.

      Ask another technician to take the call

    • C.

      Troubleshoot the issue for the user

    • D.

      Input the issue as a ticket and escalate to Tier 2

    • E.

      Put the user on hold and troubleshoot after the scheduled break

    Correct Answer
    B. Ask another technician to take the call
    Explanation
    You want to perform to the best of your ability while meeting the obligations of your workplace. The best option is to have another technician that is available.

    Rate this question:

  • 13. 

    A user’s phone contains customer’s PII. The user cannot have the phone automatically wiped because the data is very valuable. Which of the following is the BEST method of securing the phone?

    • A.

      Fingerprint lock

    • B.

      Passcode lock

    • C.

      Swipe lock

    • D.

      PIN lock

    Correct Answer
    A. Fingerprint lock
    Explanation
    *##*Fingerprint Locking is the most secure of these 4 options. Biometric security makes it harder while the other options can be brute forced or provide no security.*##*Swipe lock doesn't provide any security.

    A PIN can be brute forced easily

    A passcode is secure to a point, but it's not as secure as a biometric lock.

    Rate this question:

  • 14. 

    Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer’s design? (Select two.)

    • A.

      UPS

    • B.

      Server rack

    • C.

      Desktop printer

    • D.

      Patch panel

    • E.

      Modem

    Correct Answer(s)
    A. UPS
    B. Server rack
    Explanation
    UPS (Uninterruptible Power Supply) and server racks are both devices that are commonly used in data centers or server rooms where the grounding of electrical equipment is crucial for safety and proper functioning. UPS devices often have grounding wires to ensure that any electrical faults are safely directed to the ground. Server racks also typically have grounding wires to prevent static electricity buildup and to protect sensitive equipment from electrical surges. On the other hand, desktop printers, patch panels, and modems are not typically designed with grounding wires as they are not as sensitive to electrical issues as UPS and server racks.

    Rate this question:

  • 15. 

    A technician has just finished installing a secondary OS on a workstation. After rebooting the computer, the technician receives the following error: No OS found. The technician confirms the boot.ini file is correct. Which of the following is MOST likely causing this error?

    • A.

      The computer has GRUB Legacy installed

    • B.

      Windows Startup services are not running

    • C.

      An incompatible partition is marked as active

    • D.

      An unsupported version of Windows is installed

    Correct Answer
    C. An incompatible partition is marked as active
    Explanation
    An incompatible partition being marked as active is the most likely cause of the error "No OS found" after installing a secondary OS. When a partition is marked as active, the computer looks for an operating system in that partition during boot. If the partition contains an incompatible OS or no OS at all, the error message is displayed. In this case, the technician has confirmed that the boot.ini file is correct, ruling out other potential causes such as GRUB Legacy, Windows Startup services, or an unsupported version of Windows.

    Rate this question:

  • 16. 

    A technician is installing a private PC in a public workspace. Which of the following password practices should the technician implement on the PC to secure network access?

    • A.

      Remove the guest account from the administrators group

    • B.

      Disable single sign-on

    • C.

      Issue a default strong password for all users

    • D.

      Require authentication on wake-up

    Correct Answer
    D. Require authentication on wake-up
    Explanation
    This one might be designed to trick you. By default, a guest account won't be in the administrators group. Disabling single sign-on is not going to secure network access. And issuing a default strong password for all users is a good second choice, however, requiring authentication on wake-up would be the most detrimental in a public setting.

    Consider this: If the end-user is walking away constantly in this public space, enabling or disabling any other option won't stop a malicious individual from walking up to the PC and then walking away. Unless the user locks their PC and it requires password authentication to wake-up.

    Rate this question:

  • 17. 

    Joe, an employee, took a company-issued Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server. Joe has verified he is connected to the Internet. Which of the following would explain why Joe cannot access his personal shares?

    • A.

      An IP conflict is present

    • B.

      A corporate VPN is enabled

    • C.

      A firewall exception must be set

    • D.

      HomeGroup must be enabled

    Correct Answer
    C. A firewall exception must be set
    Explanation
    Joe cannot access his personal shares because a firewall exception must be set. This means that the firewall on Joe's company-issued Windows laptop is blocking the connection to his home media server. By setting a firewall exception, Joe can allow the necessary network traffic to pass through the firewall and access his personal shares.

    Rate this question:

  • 18. 

    A user believes there is a virus on a laptop. The user installs additional real-time protection antivirus software but is now experiencing extremely slow performance on the laptop. Which of the following should a technician do to resolve the issue and avoid recurrence?

    • A.

      Activate real-time protection on both antivirus software programs

    • B.

      Uninstall one antivirus software program and install a different one

    • C.

      Run OS updates

    • D.

      Enable the quarantine feature on both antivirus software programs

    • E.

      Remove the user-installed antivirus software

    Correct Answer
    E. Remove the user-installed antivirus software
    Explanation
    Installing multiple real-time protection antivirus software programs can cause conflicts and slow down the performance of the laptop. Removing the user-installed antivirus software will eliminate any conflicts and improve the performance of the laptop.

    Rate this question:

  • 19. 

    A user who is running Windows XP calls a technician to upgrade the computer to a newer Windows OS. The user states the computer has only 1GB of RAM and 16GB of hard drive space with a 1.7GHz processor. Which of the following operating systems should the technician recommended to ensure the BEST performance on this computer?

    • A.

      Windows 7

    • B.

      Windows 8

    • C.

      Windows 8.1

    • D.

      Windows 10

    Correct Answer
    A. Windows 7
    Explanation
    This is a question meant to trick you into thinking it's a specifications issue. Technically, the user's Windows XP machine meets the minimum 32bit requirements for all 4 versions of Windows. However, it says "upgrade" not Clean Install.
     

    There is not a direct option to upgrade to Windows 8+. But there is an option to upgrade to Windows 7. The difference between upgrading and a clean install would be the loss of files and settings. 


     

    Rate this question:

  • 20. 

    Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time because he has already tried everything that has been suggested. Which of the following should the technician do?

    • A.

      Since Joe is concerned about time, suggest calling back later when Joe has more time to troubleshoot

    • B.

      Record the call and send it to the local intranet for future technicians to learn how to deal with calls like this one

    • C.

      Ask more open-ended questions to see if the issue can be narrowed down in order to properly identify the issue and save time

    • D.

      Inform the customer that there is a troubleshooting script that must be followed to get the issue resolved

    Correct Answer
    C. Ask more open-ended questions to see if the issue can be narrowed down in order to properly identify the issue and save time
    Explanation
    The technician should ask more open-ended questions to try and narrow down the issue. By asking specific questions, the technician can gather more information and potentially identify the problem more efficiently. This approach can help save time by avoiding unnecessary troubleshooting steps that have already been tried by the customer. It also shows the technician's commitment to resolving the issue and addressing the customer's concerns.

    Rate this question:

  • 21. 

    Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?

    • A.

      SSO

    • B.

      Permission propagation

    • C.

      Inheritance

    • D.

      MFA

    Correct Answer
    A. SSO
    Explanation
    *##*SSO (Single-Sign On) is the only option that allows an end-user to enter the same username and password once to use for multiple applications.*##*Permission propagation, Inheritance, and MFA (Multi-Factor Authentication) do not offer this option.

    Rate this question:

  • 22. 

    A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have access to only the application needed for customer interaction. The technician must also ensure that whenever the computer is rebooted or powered on it logs on automatically without a password. Which of the following account types would the technician MOST likely set up on this kiosk machine?

    • A.

      Guest

    • B.

      Administrator

    • C.

      Power User

    • D.

      Remote Desktop User

    Correct Answer
    A. Guest
    Explanation
    The Administrator and Power User privilege are too much for these users and Remote Desktop User doesn't apply here. Guest is the most likely option.

    Rate this question:

  • 23. 

    A technician has been asked to recommend antivirus software for a home PC, but the user does not want to pay for a license. Which of the following license type should the technician recommend?

    • A.

      Open license

    • B.

      Personal license

    • C.

      Corporate license

    • D.

      Enterprise license

    Correct Answer
    A. Open license
    Explanation
    An Open License is the only license that is free.

    Rate this question:

  • 24. 

    Joe, a systems administrator, is setting up a risk management plan for the IT department. Part of the plan is to take daily backups of all servers. The server backups will be saved locally to NAS. Which of the following can Joe do to ensure the backups will work if needed?

    • A.

      Frequently restore the servers from backup files and test them

    • B.

      Configure the backups to restore to virtual machines for quick recovery

    • C.

      Set up scripts that automatically rerun failed backup jobs

    • D.

      Store copies of the backups off-site in a secure data-center

    • E.

      Set up alerts to let administrators know when backups fail

    Correct Answer
    E. Set up alerts to let administrators know when backups fail
    Explanation
    Joe can set up alerts to let administrators know when backups fail in order to ensure that the backups will work if needed. This will allow the administrators to take immediate action and address any issues or errors with the backups, ensuring that they are functioning properly and can be relied upon for recovery if necessary. By being alerted to backup failures, the IT department can promptly troubleshoot and resolve any problems, minimizing the risk of data loss and maximizing the effectiveness of the backup plan.

    Rate this question:

  • 25. 

    A SOHO customer has recently experienced a major hurricane. The customer has no backups and has lost all data and hardware associated with the company. The customer calls a contractor to assist in the rebuilding process and needs suggestions on the best way to prevent this from happening again. Which of the following recommendations should the contractor give to the customer? (Select two.)

    • A.

      Backup testing

    • B.

      Cloud storage

    • C.

      Local storage backups

    • D.

      Data recovery

    • E.

      Hot site

    • F.

      Waterproof devices

    Correct Answer(s)
    B. Cloud storage
    E. Hot site
    Explanation
    The contractor should recommend cloud storage as one of the solutions to prevent data loss in the future. Cloud storage allows the customer to store their data remotely, ensuring that even if their hardware is damaged or destroyed, their data will still be accessible. Additionally, the contractor should suggest setting up a hot site, which is a duplicate of the customer's IT infrastructure located in a different geographical area. This way, if the main site is affected by a disaster, the hot site can be activated to ensure business continuity.

    Rate this question:

  • 26. 

    A technician is running updates on a Windows PC. Some of the updates install properly, while others appear as failed. While troubleshooting, the technician restarts the PC and attempts to install the failed updates again. The updates continue to fail. Which of the following is the FIRST option to check?

    • A.

      Visit the Microsoft Update website to see if there is an issue with a specific update

    • B.

      Look up the error number associated with the failed update

    • C.

      Look at the system Event Viewer to find more information on the failure

    • D.

      Download the failed update to install manually

    Correct Answer
    B. Look up the error number associated with the failed update
    Explanation
    When there is an error inside the Windows Update process there is typically a code delivered with the error that allows users o research that specific error.

    Visiting the Microsoft Update Website might be the most informal task as you would likely run into Forums or notices but not an actual fix, unless it's a manual workaround. And what information would be used in your search?

    If you look at the Event Viewer it would likely supply you with the same error number and when it occurred but not why and how to fix it. So, you will be in the same spot you started.

    Manually doing the same task would likely not work.

    Instead, if you look up the error number; Microsoft would likely have documentation on what, where, and why. When you look up an error it will take you in the direct path of Microsoft's fix and requirements. 



    Like reaching into an active Appendix, Microsoft will tell you why or what is causing the issue and tell you what to do next or why it did this. The below example is one such scenario:
    If an update meant to fix an error is installed before the update that caused the error. You will get an error that was supposed to be fixed. (I'm not saying this is what that update does, it's a scenario).

    In the sequence that happens next, it could detail the options in the correct order.

    Find Error Number > Look at Event Viewer to find more information on that failure >  Then Visit the Microsoft Update site to see that specific update > Uninstall that last update > And  then install the failed update manually.

    Rate this question:

  • 27. 

    A technician needs to edit a protected .dll file but cannot find the file in the System32 directory. Which of the following Control Panel utilities should the technician use?

    • A.

      System

    • B.

      Display

    • C.

      Folder Options

    • D.

      Indexing Options

    Correct Answer
    C. Folder Options
    Explanation
    The technician should use the "Folder Options" utility in the Control Panel. This utility allows the user to customize various settings related to folders and files, including the ability to view and modify protected system files. By enabling the option to show hidden files and folders, the technician will be able to locate and edit the protected .dll file that they need.

    Rate this question:

  • 28. 

    A technician has identified malware on a user’s system. Which of the following should the technician do NEXT according to malware removal best practices?

    • A.

      Enable System Restore and create a restore point so no data is lost

    • B.

      Educate the user about how to avoid malware in the future

    • C.

      Update the antivirus software and run a full system scan

    • D.

      Move the infected system to a lab with no network connectivity

    Correct Answer
    D. Move the infected system to a lab with no network connectivity
    Explanation
    Identify malware symptoms. << Technician DID THIS
    Quarantine infected systems. << THIS IS what the Technician should do next.
    Disable System Restore.
    Re-mediate: Update antivirus.
    Re-mediate: Scan and remove.
    Schedule scans and run updates.
    Educate the end user.


    "Im the Quirky Dr. of the USS Enterprise"

    Rate this question:

  • 29. 

    A user’s Windows laptop has become consistently slower over time. The technician checks the CPU utilization and sees that it varies between 95% and 100%. After the technician closes some running applications, the CPU utilization drops to approximately 20%, and the laptop runs much faster. The next day the same user calls again with the same problem. Which of the following is a tool the technician can use to resolve the issue?

    • A.

      Task Manager

    • B.

      MSTSC

    • C.

      MSConfig

    • D.

      PerfMon

    Correct Answer
    A. Task Manager
    Explanation
    The technician can use Task Manager to resolve the issue. Task Manager allows the technician to view and manage the running processes and applications on the laptop. By closing unnecessary or resource-intensive applications, the technician can reduce the CPU utilization and improve the laptop's performance. However, since the issue persists the next day, there may be underlying factors causing the high CPU utilization that need to be further investigated.

    Rate this question:

  • 30. 

    A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown while providing at least one hour of up-time in case of extreme weather conditions. Which of the following should a technician recommend?

    • A.

      UPS (Uninterruptible Power Supply)

    • B.

      Surge protector

    • C.

      Power strip

    • D.

      Power distribution unit

    Correct Answer
    A. UPS (Uninterruptible Power Supply)
    Explanation
    A UPS (Uninterruptible Power Supply) is the correct recommendation in this scenario. A UPS provides battery backup power to devices in the event of a power outage or fluctuation. This will prevent file corruption by allowing the devices to shut down properly without losing any data. Additionally, a UPS can provide at least one hour of uptime during extreme weather conditions, ensuring that critical operations can continue even if the power supply is disrupted. Surge protectors, power strips, and power distribution units do not provide the same level of protection and backup power as a UPS.

    Rate this question:

  • 31. 

    A MAC user’s operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC. Which of the following built-in utilities should be used?

    • A.

      Time Machine

    • B.

      Snapshot

    • C.

      System Restore

    • D.

      Boot Camp

    Correct Answer
    A. Time Machine
  • 32. 

    A manager requests remote access to a server after hours and on weekends to check data. The manager insists on using the server. Before granting the access, which of the following is the MOST important step a technician can take to protect against possible infection?

    • A.

      Create a policy to remove Internet access from the server during off hours

    • B.

      Set the local antivirus software on the server to update and scan daily

    • C.

      Ensure the server is patched with the latest security updates

    • D.

      Educate the manager on safe Internet browsing practices

    Correct Answer
    C. Ensure the server is patched with the latest security updates
    Explanation
    The most important step a technician can take to protect against possible infection is to ensure that the server is patched with the latest security updates. Patching the server with the latest security updates helps to fix any known vulnerabilities or weaknesses in the server's software, making it less susceptible to attacks or infections. This is crucial in maintaining the server's security and protecting it from potential threats, especially when granting remote access to a manager who will be accessing the server after hours and on weekends.

    Rate this question:

  • 33. 

    A manager with a restricted user account receives the following error message: Windows Update cannot currently check for updates because the service is not running. The manager contacts the help desk to report the error. A technician remotely connects to the user’s computer and identifies the problem. Which of the following should the technician do NEXT?

    • A.

      Reboot the computer

    • B.

      Restart the network services

    • C.

      Roll back the device drivers

    • D.

      Rebuild the Windows profiles

    Correct Answer
    B. Restart the network services
    Explanation
    The technician should restart the network services. This error message indicates that the Windows Update service is not running, which could be due to a network connectivity issue. By restarting the network services, the technician can ensure that the necessary network connections are established and the Windows Update service can function properly. Rebooting the computer may not resolve the underlying network issue, so it is not the best next step. Rolling back device drivers or rebuilding Windows profiles are unrelated to the network services and would not address the problem.

    Rate this question:

  • 34. 

    A SOHO technician recently moved some data from one server to another to increase storage capacity. Several users are now reporting they cannot access certain shares on the network. When the users attempt to access the shares, they get the following error: "Access Denied". The technician confirms the users are all in the proper security groups and have the proper access, but they are still unable to access the shares. Which of the following are the MOST likely reasons for these issues? (Select two.)

    • A.

      Administrative share permissions

    • B.

      Mapped drives

    • C.

      Group Policy hours restriction

    • D.

      Denied write/delete permissions

    • E.

      Disabled proxy settings

    Correct Answer(s)
    B. Mapped drives
    D. Denied write/delete permissions
    Explanation
    The technician moved the data to another server that needs be remapped and also modified to make sure the permissions enable the end-users to access the data properly.

    Rate this question:

  • 35. 

    With which of the following types is a man-in-the-middle attack associated?

    • A.

      Brute force

    • B.

      Spoofing

    • C.

      DDoS

    • D.

      Zero-day

    Correct Answer
    B. Spoofing
    Explanation
    A MITM attack is done using spoofing to mask the attacker as someone trusted.

    Rate this question:

  • 36. 

    An employee reported that a suspicious individual was looking through the recycle bin. Which of the following types of social engineering threats is this?

    • A.

      Phishing

    • B.

      Spear phishing

    • C.

      Dumpster diving

    • D.

      Impersonation

    Correct Answer
    C. Dumpster diving
    Explanation
    Dumpster diving is exactly how it sounds. The individual looks in your waste to find material.

    Rate this question:

  • 37. 

    A SOHO user reports desktop applications are performing slowly, and no emails have been received all morning. A technician remotes in and determines Internet pages’ load slowly or not at all, CPU performance is normal, and the local router can successfully ping. The remote connection drops periodically. Which of the following steps should the technician take NEXT to resolve the problem?

    • A.

      Reboot into safe mode, uninstall the latest OS update, and run a repair on the OS

    • B.

      Update the antivirus software, run an antivirus scan, verify the browser settings, and check all email settings

    • C.

      Reboot to BIOS setup, verify the TPM is enabled, and start a System Restore from safe mode

    • D.

      Send a test email, open a command prompt to check the file system, and empty the browser cache

    Correct Answer
    B. Update the antivirus software, run an antivirus scan, verify the browser settings, and check all email settings
    Explanation
    *##*Updating the antivirus software, running a scan, verifying the browser settings are correct along with the hosts file and checking all email settings will provide a better resolution to the problem than changing more settings.*##*What's being described here is a connection issue. Modifying the BIOS and changing the OS is a leap but also not relevant to the immediate issue of the internet. The technician found nothing wrong with the CPU, only slow loading pages and periodic connections dropped.

    Sending a test email, running a file system check, and emptying the browser cache isn't necessarily wrong but doesn't seem like something that will resolve the problem.

    Rate this question:

  • 38. 

    An employee is unable to view in-office network folders while working at home. Which of the following is the MOST likely cause of the problem?

    • A.

      Untrusted software

    • B.

      Outdated antivirus

    • C.

      MDM policies

    • D.

      Inactive VPN

    Correct Answer
    D. Inactive VPN
    Explanation
    An Inactive VPN is the MOST likely item to inhibit a remote worker.

    Rate this question:

  • 39. 

    A network administrator has given a technician documentation detailing the switch-ports the technician will need to patch in for a network upgrade. Which of the following documents did the network administrator MOST likely give to the technician?

    • A.

      Process diagram

    • B.

      Physical network diagram

    • C.

      Fiber backbone diagram

    • D.

      Logical topology diagram

    Correct Answer
    B. Physical network diagram
    Explanation
    The network administrator most likely gave the technician a physical network diagram. This diagram provides a visual representation of the physical layout of the network, including the switch-ports that need to be patched in for the network upgrade. It shows the physical connections between devices, such as switches, routers, and servers, and helps the technician understand how to physically connect the network components. The other options, such as process diagram, fiber backbone diagram, and logical topology diagram, do not specifically provide information about the switch-ports and their physical connections.

    Rate this question:

  • 40. 

    After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked with limiting removable hard drive access to certain network users. USB ports are used for many devices, including scanners, printers, and signature pads, so a policy is created to deny access to removable hard drives only. When testing the policy, a removable drive is plugged in but can still be accessed. Which of the following command-line tools should the technician use to apply the new policy?

    • A.

      Gpupdate

    • B.

      Diskpart

    • C.

      Gpresult

    • D.

      Net use

    Correct Answer
    A. Gpupdate
    Explanation
    The question is which CMD tool allows a technician to apply a new policy. The only option here that can do that is gpupdate which stands for for group policy update.

    Rate this question:

  • 41. 

    A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately. With which of the following types of infections are the PCs MOST likely infected? (Select two.)

    • A.

      Spyware

    • B.

      Zombies

    • C.

      Virus

    • D.

      Ransomware

    • E.

      Worm

    • F.

      Botnet

    Correct Answer(s)
    B. Zombies
    E. Worm
    Explanation
    The PCs are most likely infected with Zombies and Worms. Zombies are infected computers that are controlled remotely by an attacker and used to launch DDoS attacks. Worms are self-replicating malware that can spread across a network and infect multiple computers, which aligns with the scenario of multiple internal Windows PCs being the source of the traffic. Both Zombies and Worms can be used as part of a botnet, but the question specifically asks for the types of infections, so Botnet is not a correct answer on its own.

    Rate this question:

  • 42. 

    Ann, a user, is attempting to log in to her email service form a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid. Ann then decides to reset her email password, but after the reset, the new credentials still do not work in the third-party email client. Which of the following settings or features is responsible for the problems Ann is experiencing?

    • A.

      Full device encryption

    • B.

      Account lock

    • C.

      Multi-factor authentication

    • D.

      Strong password requirements

    Correct Answer
    C. Multi-factor authentication
    Explanation
    The problem Ann is experiencing is likely due to multi-factor authentication. Multi-factor authentication adds an extra layer of security by requiring users to provide multiple forms of verification, such as a password and a unique code sent to their phone. Since Ann is using a third-party email client, it may not support multi-factor authentication, causing her credentials to be invalid. Resetting her email password would not resolve the issue because the third-party email client still does not support multi-factor authentication.

    Rate this question:

  • 43. 

    In which of the following file extension types would a user expect to see the command. “net use T:\\server\files’?

    • A.

      .bat

    • B.

      .vbs

    • C.

      .js

    • D.

      .py

    Correct Answer
    A. .bat
    Explanation
    "net use" is a command that you would see in a .bat script or more specifically, CMD prompt.

    Rate this question:

  • 44. 

    A user contacts a technician to troubleshoot server errors. The user explains that some files will not open on the server, the data backups are operational, and the weather has been bad. The technician notices missing time slots in the event log. Which of the following should the technician replace to prevent these issues in the future?

    • A.

      System memory

    • B.

      Surge protector

    • C.

      Hard drives

    • D.

      Battery backup

    Correct Answer
    D. Battery backup
    Explanation
    If the battery backup went down during an outage, then that would directly explain the missing time and seemingly the corrupted files/backups.

    Rate this question:

  • 45. 

    Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC?

    • A.

      Put on an ESD strap.

    • B.

      Place components on an ESD mat

    • C.

      Disconnect the power before servicing the PC

    • D.

      Place the PC on a grounded work bench

    Correct Answer
    C. Disconnect the power before servicing the PC
    Explanation
    While none of these options are bad, you should not work in a PC still receiving power. That's the absolute first thing to do!

    Rate this question:

  • 46. 

    Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the memory, power supply, and monitor are all working. The technician runs internal diagnostics on the PC, but the hard drive is not recognized. Which of the following messages will be displayed?

    • A.

      NTLDR not found

    • B.

      No boot device available

    • C.

      Operating system not found

    • D.

      BIOS ROM checksum error

    Correct Answer
    B. No boot device available
    Explanation
    The message "No boot device available" will be displayed. This message indicates that the computer is unable to find any device from which it can boot the operating system. Since the hard drive is not recognized, the computer cannot access the necessary files to start up. This could be due to a faulty hard drive or a problem with the connection between the hard drive and the motherboard.

    Rate this question:

  • 47. 

    Ann, a user, calls the help desk regarding an issue on her laptop. While working remotely, she appears to be connecting to WiFi but is unable to retrieve her corporate email. The wireless name is listed as “ConnectMe” and appears as un-secure. Which of the following should the help desk perform to fix the issue?

    • A.

      Remote into Ann’s system and restart the wireless adapter

    • B.

      Ask Ann to open a browser and watch for a redirect page

    • C.

      Advice Ann to plug an Ethernet cable into her laptop

    • D.

      Direct Ann to run an antivirus program on her laptop

    Correct Answer
    B. Ask Ann to open a browser and watch for a redirect page
    Explanation
    While she shouldn't try to access corporate emails without a VPN, common public access wifi networks keep their networks unsecure but when you connect to their internet your browser will be forced to go to a redirect page in order to register with that network properly. Until Ann does this, she will not be able to have internet access.

    Rate this question:

  • 48. 

    A project team is organized to implement a new wireless solution for a school. The team has already done the network diagrams and knows the locations that will need to be addressed in the project. The team is in the process of creating an SOW for the project as a whole and needs to add the critical pieces to the SOW to complete it and move to the next stage. Which of the following would the project team MOST likely add to the SOW?

    • A.

      Risk analysis

    • B.

      Plan to change

    • C.

      Back-out plan

    • D.

      Change board approvals

    Correct Answer
    A. Risk analysis
    Explanation
    A statement of work (SOW) can be perceived as the same thing as a "Plan to Change". And you should have a Risk analysis before you have a back-out plan so you know what to backup for. And you're not going to ask a Board to approve something without a back out plan and a risk analysis.

    Risk Analysis is the answer!

    Rate this question:

  • 49. 

    A user calls the help desk regarding a new Windows issues that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem. Which of the following would MOST likely fix the issue?

    • A.

      Roll back updates

    • B.

      Disable the Windows Update service

    • C.

      Check for updates

    • D.

      Restore hidden updates

    Correct Answer
    A. Roll back updates
    Explanation
    Rolling back updates would most likely fix the issue because the problem started after the updates were installed. By rolling back the updates, the system will revert to the previous state before the updates were installed, potentially resolving any compatibility issues or bugs that were introduced with the updates.

    Rate this question:

  • 50. 

    An end user’s PC is taking a long time to boot. Which of the following operations would be the BEST to resolve this issue with minimal expense? (Select two.)

    • A.

      Remove applications from startup

    • B.

      Defragment the hard drive

    • C.

      Install additional RAM

    • D.

      Install a faster hard drive

    • E.

      End the processes in Task Manager

    • F.

      Run the Disk Cleanup utility

    Correct Answer(s)
    A. Remove applications from startup
    B. Defragment the hard drive
    Explanation
    Removing applications from startup can help improve boot time by reducing the number of programs that need to load during startup. This can be done by accessing the startup folder or using the system configuration utility to disable unnecessary startup programs.

    Defragmenting the hard drive can also help improve boot time by organizing fragmented files and optimizing the disk's performance. This can be done using the built-in Disk Defragmenter tool or third-party defragmentation software.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Oct 11, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 11, 2020
    Quiz Created by
    Catherine Halcomb
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.