CompTIA A+ 1002 Certification Exam Prep Test Part- I

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Themes
T
Themes
Community Contributor
Quizzes Created: 410 | Total Attempts: 753,880
Questions: 50 | Attempts: 292

SettingsSettingsSettings
CompTIA A+ 1002 Certification Exam Prep Test Part- I - Quiz

If you are preparing for the CompTIA A+ 1002 Certification exam, then you have come to the right place. This test covers various domains such as operating systems, workstations, software troubleshooting, security, operational procedures, etc. So, get ready for the perfect learning session. Read all the questions carefully and choose the right answer!


Questions and Answers
  • 1. 

    A user’s computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening. Which of the following should the technician attempt NEXT?

    • A.

      Reboot into safe mode and roll back the updates

    • B.

      Repair the Windows Registry

    • C.

      Configure boot options in the BIOS

    • D.

      Disable Windows services and applications

    Correct Answer
    A. Reboot into safe mode and roll back the updates
    Explanation
    The technician should attempt to reboot the computer into safe mode and roll back the updates. This is because the black screen issue could be caused by a faulty update that was installed the previous evening. By booting into safe mode, the technician can start the computer with minimal drivers and services, allowing them to uninstall or roll back the problematic update.

    Rate this question:

  • 2. 

    A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring. Which of the following would BEST accomplish this goal?

    • A.

      Use an antivirus product capable of performing heuristic analysis

    • B.

      Use a host-based intrusion detection system on each computer

    • C.

      Disallow the password caching of accounts in the administrators group

    • D.

      Install a UTM in between PC endpoints to monitor for suspicious traffic

    • E.

      Log all failed login attempts to the PCs and report them to a central server

    Correct Answer
    A. Use an antivirus product capable of performing heuristic analysis
    Explanation
    Using an antivirus product capable of performing heuristic analysis would be the best solution in this scenario. Heuristic analysis allows the antivirus software to detect and identify new or unknown malware based on its behavior and characteristics, rather than relying solely on known virus signatures. This would help in preventing future malware infections, as the antivirus software would be able to detect and block any suspicious or malicious activity on the computer and prevent it from spreading to other PCs.

    Rate this question:

  • 3. 

    A company brings in contractors several times a year to perform inventory, and the contractors use company-supplied laptops. The company’s security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory. Which of the following BEST enforces this policy?

    • A.

      Delete the user accounts

    • B.

      Disable the user accounts

    • C.

      Restrict the user accounts

    • D.

      Reset the user accounts

    Correct Answer
    B. Disable the user accounts
    Explanation
    Disabling the user accounts is the best way to enforce the policy mentioned in the scenario. By disabling the user accounts, the contractors will not be able to log in to the laptops after the inventory is completed, ensuring compliance with the security policy.

    Rate this question:

  • 4. 

    A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server. Which of the following Control Panel utilities should the technician use to configure the setting?

    • A.

      Internet Options -> Advanced

    • B.

      Internet Options -> Connections

    • C.

      Internet Options -> Content

    • D.

      Internet Options -> Security

    • E.

      Internet Options -> Privacy

    Correct Answer
    B. Internet Options -> Connections
    Explanation
    The technician should use the "Internet Options -> Connections" utility to configure the setting. This utility allows the technician to specify the proxy server settings for the Windows workstations.

    Rate this question:

  • 5. 

    A technician is working at a help-desk form and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in. Which of the following is the BEST choice for the technician to make?

    • A.

      Politely ask the user to call back

    • B.

      Ask another technician to take the call

    • C.

      Troubleshoot the issue for the user

    • D.

      Input the issue as a ticket and escalate to Tier 2

    • E.

      Put the user on hold and troubleshoot after the scheduled break

    Correct Answer
    B. Ask another technician to take the call
    Explanation
    The technician should ask another technician to take the call because they are scheduled to take a break just after the call comes in. This ensures that the user's issue is still addressed promptly and efficiently, without causing any inconvenience to the technician who needs to take a break.

    Rate this question:

  • 6. 

    A user’s smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures. Which of the following steps should be taken FIRST to determine the cause of the issue?

    • A.

      Uninstall the camera application

    • B.

      Check the application permissions

    • C.

      Reset the phone to factory settings

    • D.

      Update all of the applications on the phone

    • E.

      Run any pending OS updates

    Correct Answer
    B. Check the application permissions
    Explanation
    To determine the cause of the issue, the first step should be to check the application permissions. This is because the camera shutter noise is being made even when the user is not taking pictures, indicating that the camera application may have unauthorized access to the phone's camera. By checking the application permissions, the user can identify if the camera application has the necessary permissions to access the camera and adjust them accordingly. This step will help in understanding if the issue is related to the camera application's permissions or if there is another underlying cause.

    Rate this question:

  • 7. 

    A SOHO technician recently moved some data from one server to another to increase storage capacity. Several users are now reporting they cannot access certain shares on the network. When the users attempt to access the shares, they get the following error: Access Denied. The technician confirms the users are all in the proper security groups and have the proper access, but they are still unable to access the shares. Which of the following are the MOST likely reasons for these issues? (Select two.)

    • A.

      Administrative share permissions

    • B.

      Mapped drives

    • C.

      Group Policy hours restriction

    • D.

      Denied write/delete permissions

    • E.

      Disabled proxy settings

    Correct Answer(s)
    B. Mapped drives
    D. Denied write/delete permissions
    Explanation
    The users' inability to access certain shares on the network could be due to two main reasons. Firstly, the issue could be related to mapped drives. If the technician moved the data from one server to another, the mapped drives may still be pointing to the old server, resulting in access denial. Secondly, the problem could be caused by denied write/delete permissions. Even if the users are in the proper security groups and have the proper access, they may not have the necessary permissions to write to or delete files in the shares, leading to the access denied error.

    Rate this question:

  • 8. 

    A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission. If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns?

    • A.

      Default SSID

    • B.

      MAC filtering

    • C.

      Power levels

    • D.

      Content filtering

    • E.

      Firewall

    Correct Answer
    C. Power levels
    Explanation
    By changing the power levels of the wireless network, the small business can limit the range of the network signal. This means that the nearby company would not be able to connect to the network without being physically close to the business premises. By reducing the power levels, the network signal will be weaker and have a shorter range, making it more difficult for unauthorized users to connect to the network from a distance. This can help address the concerns of the business owners and prevent unauthorized access to their wireless network.

    Rate this question:

  • 9. 

    Joe, a systems administrator, is setting up a risk management plan for the IT department. Part of the plan is to take daily backups of all servers. The server backups will be saved locally to NAS. Which of the following can Joe do to ensure the backups will work if needed?

    • A.

      Frequently restore the servers from backup files and test them

    • B.

      Configure the backups to restore to virtual machines for quick recovery

    • C.

      Set up scripts that automatically rerun failed backup jobs

    • D.

      Set up alerts to let administrators know when backups fail

    • E.

      Store copies of the backups off-side in a secure datacenter

    Correct Answer
    D. Set up alerts to let administrators know when backups fail
    Explanation
    Joe can ensure that the backups will work if needed by setting up alerts to let administrators know when backups fail. This will allow the administrators to take immediate action and resolve any issues with the backups, ensuring that they are functioning properly. This proactive approach will help to minimize the risk of data loss and ensure that the backups are reliable and effective.

    Rate this question:

  • 10. 

    A user believes there is a virus on a laptop. The user installs additional real-time protection antivirus software but is now experiencing extremely slow performance on the laptop. Which of the following should a technician do to resolve the issue and avoid recurrence?

    • A.

      Activate real-time protection on both antivirus software programs

    • B.

      Uninstall one antivirus software program and install a different one

    • C.

      Run OS updates

    • D.

      Enable the quarantine feature on both antivirus software programs

    • E.

      Remove the user-installed antivirus software

    Correct Answer
    E. Remove the user-installed antivirus software
    Explanation
    Installing multiple real-time protection antivirus software programs can cause conflicts and slow down the performance of the laptop. Therefore, removing the user-installed antivirus software is the best solution to resolve the issue and avoid recurrence.

    Rate this question:

  • 11. 

    A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately. With which of the following types of infections are the PCs MOST likely infected? (Select two.)

    • A.

      Spyware

    • B.

      Zombies

    • C.

      Virus

    • D.

      Ransomware

    • E.

      Worm

    • F.

      Botnet

    Correct Answer(s)
    B. Zombies
    E. Worm
    Explanation
    The PCs are most likely infected with Zombies and Worms. Zombies are computers that have been infected with malware and are controlled remotely by a hacker to carry out malicious activities, such as participating in a DDoS attack. Worms are self-replicating malware that spread across a network and can cause significant damage by consuming network bandwidth and resources. In this scenario, the fact that multiple internal Windows PCs are the source of the DDoS attack suggests that they have been infected with malware that allows them to be controlled as zombies and spread as worms.

    Rate this question:

  • 12. 

    Emily, a user, has purchased a new Android phone and is attempting to access a public hotspot. When she gets a message indicating the page cannot be displayed. She notices there is a “?” in the radio icon in the toolbar. She has verified Bluetooth is active, airplane mode is off, and tethering is turned on. She uses the cell phone to call a technician for assistance. Which of the following is the MOST likely issue Emily is experiencing?

    • A.

      There is unauthenticated wireless connectivity

    • B.

      She has exceeded the data allowance

    • C.

      The phone is only 3G capable

    • D.

      It is an unrooted phone

    • E.

      The SIM card was not activated

    • F.

      A data plan was not purchased

    Correct Answer
    A. There is unauthenticated wireless connectivity
    Explanation
    Emily is experiencing unauthenticated wireless connectivity. The presence of the "?" in the radio icon suggests that the phone is connected to a Wi-Fi network, but it is not able to authenticate and access the internet. This could be due to incorrect login credentials or a network issue.

    Rate this question:

  • 13. 

    A technician is working on a Windows 10 PC that is running slowly. Which of the following commands should the technician use to correct this issue? (Select two.)

    • A.

      Dir

    • B.

      Chdsk

    • C.

      Dism

    • D.

      Ipconfig

    • E.

      Format

    • F.

      Diskpart

    Correct Answer(s)
    B. Chdsk
    C. Dism
    Explanation
    The technician should use the "chdsk" command to check the integrity of the file system and correct any errors. This command scans the hard drive for errors and fixes them if possible, which can help improve the performance of the PC. Additionally, the technician should use the "dism" command to repair the Windows image and restore any corrupted system files. This command can help resolve issues that may be causing the PC to run slowly.

    Rate this question:

  • 14. 

    A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the business’s concerns. Which of the following configuration settings should the technician change to satisfy the requirements of the business? (Select two.)

    • A.

      Default SSID

    • B.

      MAC filtering

    • C.

      NAT

    • D.

      QoS

    • E.

      Signal strength

    • F.

      Encryption

    Correct Answer(s)
    B. MAC filtering
    E. Signal strength
    Explanation
    The technician should change the configuration settings of MAC filtering and signal strength to satisfy the requirements of the business. MAC filtering allows the business to create a list of approved MAC addresses, ensuring that only authorized devices can connect to the network. By enabling MAC filtering, the technician can prevent customers from connecting to the access point. Adjusting the signal strength can help limit the range of the WiFi network, ensuring that it is only accessible to employees within the business premises and not to customers outside the premises.

    Rate this question:

  • 15. 

    A wireless access point is going to be configured in a small office located in a crowded building. Which of the following should the installation technician perform to increase the security of the wireless network? (Select two.)

    • A.

      Reduce the transmit power

    • B.

      Reduce the channel availably

    • C.

      Enable QoS management

    • D.

      Disable the SSID broadcast

    • E.

      Implement WPA encryption

    Correct Answer(s)
    A. Reduce the transmit power
    D. Disable the SSID broadcast
    Explanation
    To increase the security of the wireless network in a crowded building, the installation technician should reduce the transmit power of the wireless access point. By reducing the transmit power, the signal range will be limited to the office area, making it more difficult for unauthorized users outside the office to access the network. Additionally, the technician should disable the SSID broadcast. This will prevent the wireless network from being visible to nearby devices, making it harder for potential attackers to identify and target the network.

    Rate this question:

  • 16. 

    A security team is auditing a company’s network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information. Which of the following actions should be taken to close the vulnerability? (Select two.)

    • A.

      Disable guest account

    • B.

      Remove admin permissions

    • C.

      Change default credentials

    • D.

      Run OS security updates

    • E.

      Install a software firewall

    Correct Answer(s)
    A. Disable guest account
    C. Change default credentials
    Explanation
    To close the vulnerability, the security team should take two actions. First, they should disable the guest account to prevent unauthorized access. This will ensure that only authorized users can log in to the servers. Second, they should change the default credentials, as using common login information makes it easier for attackers to gain access. By changing the default credentials, the security team will strengthen the authentication process and make it more difficult for unauthorized individuals to log in.

    Rate this question:

  • 17. 

    A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources. Which of the following protocols and authentication methods should the technician implement? (Select two.)

    • A.

      WPA

    • B.

      WPA2

    • C.

      WEP

    • D.

      TKIP

    • E.

      RADIUS

    • F.

      Multifactor

    • G.

      TACACS

    • H.

      SSO

    Correct Answer(s)
    B. WPA2
    F. Multifactor
    Explanation
    The technician should implement WPA2 for wireless security as it provides the highest level of security among the options listed. Additionally, the technician should implement multifactor authentication to ensure various levels of desktop authentication for accessing cloud resources. This combination of WPA2 and multifactor authentication will provide the highest level of wireless security and desktop authentication for the healthcare office's SOHO wireless network.

    Rate this question:

  • 18. 

    Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer’s design? (Select two.)

    • A.

      UPS

    • B.

      Server rack

    • C.

      PoE phone

    • D.

      Desktop printer

    • E.

      Modem

    • F.

      Patch panel

    Correct Answer(s)
    A. UPS
    B. Server rack
    Explanation
    UPS (Uninterruptible Power Supply) and server racks are most likely to have grounding wires attached to them based on the manufacturer's design. UPS is designed to provide backup power to critical devices and is often connected to sensitive electronic equipment, which requires grounding to protect against electrical surges and ensure proper functioning. Server racks house multiple servers and networking equipment, which generate a significant amount of heat and electrical activity. Grounding is essential to prevent electrical hazards and maintain the integrity of the equipment.

    Rate this question:

  • 19. 

    Which of the following provide the BEST security for a server room? (Select two.)

    • A.

      Badge reader

    • B.

      Bollard

    • C.

      Biometric lock

    • D.

      Cable lock

    • E.

      USB token

    • F.

      Privacy window shade

    Correct Answer(s)
    A. Badge reader
    C. Biometric lock
    Explanation
    Badge readers and biometric locks provide the best security for a server room. A badge reader requires authorized personnel to swipe a badge or card to gain access, ensuring only approved individuals can enter the room. Biometric locks use unique physical characteristics, such as fingerprints or iris scans, to verify the identity of individuals attempting to enter the server room. These two security measures work together to prevent unauthorized access and protect the sensitive information stored in the server room.

    Rate this question:

  • 20. 

    Ann, an employee at a company, calls the help disk to report issues logging on to a vendor’s website. Joe, the technician, is able to log in successfully with his credentials before going to Ann’s office. However, when he attempts to log in from Ann’s office, Joe experiences the same issue. Ann asks Joe questions about the new software installed on the laptop from the pop-up notification. Which of the following are the NEXT steps Joe should take to resolve the issue? (Select two.)

    • A.

      Ask Ann for her credentials to verify and log on to the vendor’s website from Ann’s laptop

    • B.

      Verify Ann’s laptop has the correct browser settings

    • C.

      Check all browser cached files on Ann’s laptop and log on to another vendor’s website

    • D.

      Attempt to log on to another vendor’s website from Ann’s laptop

    • E.

      Ask Ann about the notification and review the installed programs

    • F.

      Reinstall the browser, reboot the laptop, and check the vendor’s website again

    Correct Answer(s)
    C. Check all browser cached files on Ann’s laptop and log on to another vendor’s website
    E. Ask Ann about the notification and review the installed programs
    Explanation
    Joe should first check all browser cached files on Ann's laptop and attempt to log on to another vendor's website. This will help determine if the issue is specific to the vendor's website or if it is a broader issue with the browser or cached files. Additionally, Joe should ask Ann about the notification and review the installed programs. This will provide more information about any recent changes or updates that may be causing the login issue. By taking these steps, Joe can troubleshoot the issue and identify the root cause to resolve it effectively.

    Rate this question:

  • 21. 

    An end user’s PC is taking a long time to boot. Which of the following operations would be the BEST to resolve this issue with minimal expense? (Select two.)

    • A.

      Remove applications from startup

    • B.

      Defragment the hard drive

    • C.

      Install additional RAM

    • D.

      Install a faster hard drive

    • E.

      End the processes in Task Manager

    • F.

      Run the Disk Cleanup utility

    Correct Answer(s)
    A. Remove applications from startup
    B. Defragment the hard drive
    Explanation
    Removing applications from startup and defragmenting the hard drive can both help improve the boot time of an end user's PC. Removing applications from startup reduces the number of programs that need to load during startup, freeing up system resources and speeding up the boot process. Defragmenting the hard drive rearranges fragmented files, allowing them to be accessed more efficiently and reducing the time it takes for the operating system to load. These solutions are both cost-effective as they do not require any additional hardware or software purchases.

    Rate this question:

  • 22. 

    An administrator is setting up a Windows terminal server. Which of the following settings should the administrator modify to increase server security? (Select two.)

    • A.

      Change the default access port

    • B.

      Enforce password complexity

    • C.

      Put the terminal server into the router's DMZ

    • D.

      Disable logon time restrictions

    • E.

      Block all unused ports on the LAN smart switch

    • F.

      Use the local client certificate for server authentication

    Correct Answer(s)
    C. Put the terminal server into the router's DMZ
    E. Block all unused ports on the LAN smart switch
    Explanation
    The administrator should put the terminal server into the router's DMZ to increase server security. Placing the server in the DMZ isolates it from the internal network, providing an additional layer of protection against unauthorized access. Additionally, the administrator should block all unused ports on the LAN smart switch to prevent potential vulnerabilities and limit access to only necessary ports, further enhancing server security.

    Rate this question:

  • 23. 

    A SOHO customer has recently experienced a major hurricane. The customer has no backups and has lost all data and hardware associated with the company. The customer calls a contractor to assist in the rebuilding process and needs suggestions on the best way to prevent this from happening again. Which of the following recommendations should the contractor give to the customer? (Select two.)

    • A.

      Backup testing

    • B.

      Cloud storage

    • C.

      Local storage backups

    • D.

      Data recovery

    • E.

      Hot site

    • F.

      Waterproof devices

    Correct Answer(s)
    B. Cloud storage
    E. Hot site
    Explanation
    The contractor should recommend cloud storage as a solution to prevent data loss in the event of a disaster. Cloud storage allows data to be stored remotely on servers, ensuring that it is not affected by physical damage to the customer's premises. Additionally, the contractor should suggest implementing a hot site, which is a duplicate of the customer's infrastructure at an off-site location. This would allow the customer to quickly resume operations in the event of a disaster, as the hot site would already have the necessary hardware and data backups in place.

    Rate this question:

  • 24. 

    A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom. Which of the following needs to be adjusted on the workstation to fix the issue?

    • A.

      Date and time

    • B.

      UEFI boot mode

    • C.

      Logon times

    • D.

      User access control

    Correct Answer
    A. Date and time
    Explanation
    The invalid certificate error is likely occurring because the date and time on the workstation are incorrect. Certificates have an expiration date and if the date and time on the workstation are not accurate, it can cause the certificate to appear invalid. Adjusting the date and time on the workstation should fix the issue and allow the technician to visit the website without encountering the error.

    Rate this question:

  • 25. 

    A user’s phone contains customer’s PII. The user cannot have the phone automatically wiped because the data is very valuable. Which of the following is the BEST method of securing the phone?

    • A.

      Fingerprint lock

    • B.

      Passcode lock

    • C.

      Swipe lock

    • D.

      PIN lock

    Correct Answer
    A. Fingerprint lock
    Explanation
    The best method of securing the phone in this scenario would be a fingerprint lock. This is because it provides an additional layer of security by requiring the user's unique fingerprint to unlock the phone. This ensures that only authorized individuals can access the customer's PII, making it more difficult for unauthorized users to gain access to the valuable data.

    Rate this question:

  • 26. 

    A user’s phone contains customer’s PII. The user cannot have the phone automatically wiped because the data is very valuable. Which of the following is the BEST method of securing the phone?

    • A.

      Fingerprint lock

    • B.

      Passcode lock

    • C.

      Swipe lock

    • D.

      PIN lock

    Correct Answer
    A. Fingerprint lock
    Explanation
    A fingerprint lock is the best method of securing the phone because it provides a higher level of security compared to other options. A fingerprint lock uses biometric authentication, which means that only the owner of the phone can unlock it using their unique fingerprint. This ensures that even if the phone is lost or stolen, the customer's PII remains protected. Additionally, a fingerprint lock is more convenient as it eliminates the need to remember and enter a passcode or PIN.

    Rate this question:

  • 27. 

    A user who is running Windows XP calls a technician to upgrade the computer to a newer Windows OS. The user states the computer has only 1GB of RAM and 16GB of hard drive space with a 1,7GHz processor. Which of the following OSs should the technician recommended to ensure the BEST performance on this computer?

    • A.

      Windows 7

    • B.

      Windows 8

    • C.

      Windows 8.1

    • D.

      Windows 10

    Correct Answer
    A. Windows 7
    Explanation
    Windows 7 would be the best recommendation for this computer because it has lower system requirements compared to Windows 8, 8.1, and 10. With only 1GB of RAM and 16GB of hard drive space, the computer may struggle to meet the minimum requirements for the newer operating systems. Windows 7 is a more lightweight and optimized OS that would provide better performance on this computer.

    Rate this question:

  • 28. 

    Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?

    • A.

      SSO

    • B.

      Permission propagation

    • C.

      Inheritance

    • D.

      MFA

    Correct Answer
    A. SSO
    Explanation
    SSO, or Single Sign-On, is the best security method that allows a user to enter their username and password once and gain access to multiple applications without having to re-enter their credentials. This eliminates the need for multiple logins and enhances user convenience and productivity. SSO securely authenticates the user and propagates their permissions across different applications, providing a seamless and efficient user experience.

    Rate this question:

  • 29. 

    A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have access to only the application needed for customer interaction. The technician must also ensure that whenever the computer is rebooted or powered on it logs on automatically without a password. Which of the following account types would the technician MOST likely set up on this kiosk machine?

    • A.

      Guest

    • B.

      Administrator

    • C.

      Power User

    • D.

      Remote Desktop User

    Correct Answer
    A. Guest
    Explanation
    The technician would most likely set up a Guest account on the kiosk machine. The Guest account provides limited access to the system and restricts user privileges, ensuring security. Additionally, the Guest account does not require a password to log in, allowing for automatic login after reboot or power on. This setup would ensure that users only have access to the necessary application for customer interaction and prevent unauthorized access to the system.

    Rate this question:

  • 30. 

    A technician has been asked to recommend antivirus software for a home PC, but the user does not want to pay for a license. Which of the following license type should the technician recommend?

    • A.

      Open license

    • B.

      Personal license

    • C.

      Corporate license

    • D.

      Enterprise license

    Correct Answer
    A. Open license
    Explanation
    An open license would be the most appropriate recommendation in this scenario. An open license allows users to freely use, modify, and distribute the software without any cost. This would meet the user's requirement of not wanting to pay for a license while still providing antivirus protection for their home PC.

    Rate this question:

  • 31. 

    A user’s Windows laptop has become consistently slower over time. The technician checks the CPU utilization and sees that it varies between 95% and 100%. After the technician closes some running applications, the CPU utilization drops to approximately 20%, and the laptop runs much faster. The next day the same user calls again with the same problem. Which of the following is a tool the technician can use to resolve the issue?

    • A.

      Task Manager

    • B.

      MSTSC

    • C.

      MSConfig

    • D.

      PerfMon

    Correct Answer
    A. Task Manager
    Explanation
    The technician can use Task Manager to resolve the issue. Task Manager allows the technician to see the CPU utilization and the running applications. By closing some running applications, the CPU utilization drops and the laptop runs faster. Task Manager can be used to identify any resource-intensive applications or processes that may be causing the high CPU utilization, allowing the technician to address the issue and improve the laptop's performance.

    Rate this question:

  • 32. 

    A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown while providing at least one hour of uptime in case of extreme weather conditions. Which of the following should a technician recommend?

    • A.

      Uninterruptible power supply

    • B.

      Surge protector

    • C.

      Power strip

    • D.

      Power distribution unit

    Correct Answer
    A. Uninterruptible power supply
    Explanation
    An uninterruptible power supply (UPS) is the most suitable solution for preventing file corruption and ensuring a graceful shutdown during extreme weather conditions. A UPS provides battery backup power when the main power source fails or fluctuates. This ensures that the computer system remains powered on and operational for at least one hour, allowing sufficient time to save files and shut down properly. Surge protectors, power strips, and power distribution units do not provide battery backup and therefore do not meet the user's requirements.

    Rate this question:

  • 33. 

    Which of the following installation types would require the use of an answer file to install the OS?

    • A.

      Unattended

    • B.

      Clean

    • C.

      Repair

    • D.

      Upgrade

    Correct Answer
    A. Unattended
    Explanation
    An unattended installation type refers to the process of installing an operating system without any user interaction. It requires the use of an answer file, which contains all the necessary configuration settings and preferences for the installation. This file automates the installation process and eliminates the need for manual input from the user. Therefore, the correct answer is "Unattended" because it is the only installation type that requires the use of an answer file.

    Rate this question:

  • 34. 

    A MAC user’s operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC. Which of the following built-in utilities should be used?

    • A.

      Time Machine

    • B.

      Snapshot

    • C.

      System Restore

    • D.

      Boot Camp

    Correct Answer
    A. Time Machine
    Explanation
    Time Machine is the correct answer because it is a built-in utility in MAC operating systems that allows users to back up and restore their data. It creates regular backups of the entire system, including files, applications, and settings. By using Time Machine, the user can easily access the previously stored data and restore it to their MAC after the operating system corruption and file deletion caused by malware.

    Rate this question:

  • 35. 

    After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked with limiting removable hard drive access to certain network users. USB ports are used for many devices, including scanners, printers, and signature pads, so a policy is created to deny access to removable hard drives only. When testing the policy, a removable drive is plugged in but can still be accessed. Which of the following command-line tools should the technician use to apply the new policy?

    • A.

      Grupdate

    • B.

      Diskpart

    • C.

      Gpresult

    • D.

      Net use

    Correct Answer
    A. Grupdate
    Explanation
    The technician should use the "grupdate" command-line tool to apply the new policy. This tool is commonly used to update Group Policy settings on a Windows computer. By running the "grupdate" command, the technician can force the computer to refresh its Group Policy settings and apply any changes, including the new policy that limits access to removable hard drives. This will ensure that the policy takes effect and prevents unauthorized access to USB removable hard drives.

    Rate this question:

  • 36. 

    Joe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe states that several symptoms have returned. Which of the following should the technician have covered previously as part of the original repair?

    • A.

      End-user education

    • B.

      Pre-installation environment cleaning

    • C.

      Disabling of System Restore

    • D.

      Infected system quarantine

    Correct Answer
    A. End-user education
    Explanation
    The technician should have covered end-user education as part of the original repair. This means that the technician should have educated Joe on how to prevent future virus infections and how to recognize the symptoms of a virus. By providing end-user education, Joe would have been better equipped to avoid the return of the symptoms and prevent further virus infections.

    Rate this question:

  • 37. 

    In which of the following file extension types would a user expect to see the command. "net use T:\serverfiles"?

    • A.

      .bat

    • B.

      .vbs

    • C.

      .js

    • D.

      .py

    Correct Answer
    A. .bat
    Explanation
    A user would expect to see the command "net use T:\serverfiles" in a file with the .bat extension. The .bat extension is commonly used for batch files, which are scripts that contain a series of commands that can be executed in sequence. The "net use" command is used to connect to shared network resources, and in this case, it is used to map the T: drive to a folder on the server called "serverfiles". Therefore, the user would expect to see this command in a .bat file.

    Rate this question:

  • 38. 

    A user calls the help desk regarding a new Windows issues that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem. Which of the following would MOST likely fix the issue?

    • A.

      Roll back updates

    • B.

      Disable the Windows Update service

    • C.

      Check for updates

    • D.

      Restore hidden updates

    Correct Answer
    A. Roll back updates
    Explanation
    Rolling back updates would be the most likely solution to fix the issue because the problem started after the updates were installed. By rolling back the updates, the system will revert to the previous state before the updates were applied, which may resolve any compatibility or configuration issues that were introduced by the updates.

    Rate this question:

  • 39. 

    A technician is PXE booting a computer. Which of the following is the technician MOST likely performing on the computer?

    • A.

      Image deployment

    • B.

      Multiboot configuration

    • C.

      In-place upgrade

    • D.

      System repair

    Correct Answer
    A. Image deployment
    Explanation
    The technician is most likely performing image deployment on the computer. PXE booting is a method of booting a computer from a network interface, allowing the computer to retrieve an operating system image or installation files from a network server. This process is commonly used for deploying images to multiple computers simultaneously, making it the most likely scenario in this case.

    Rate this question:

  • 40. 

    Joe, an end user, has been prompted to provide his username and password to access the payroll system. Which of the following authentication methods is being requested?

    • A.

      Single-factor

    • B.

      Multifactor

    • C.

      RADIUS

    • D.

      TACACS

    Correct Answer
    A. Single-factor
    Explanation
    The given scenario suggests that Joe is being prompted to provide only his username and password to access the payroll system. This indicates that the authentication method being requested is single-factor authentication. Single-factor authentication relies on a single piece of information (in this case, the username and password) to verify the user's identity.

    Rate this question:

  • 41. 

    Which of the following devices provides protection against brownouts?

    • A.

      Battery backup

    • B.

      Surge suppressor

    • C.

      Rack grounding

    • D.

      Line conditioner

    Correct Answer
    A. Battery backup
    Explanation
    A battery backup provides protection against brownouts by supplying power from its own battery during periods of low voltage or temporary power outages. This ensures that connected devices receive a consistent and stable power supply, preventing damage or data loss that can occur during brownouts. Surge suppressors, rack grounding, and line conditioners do not specifically address the issue of brownouts.

    Rate this question:

  • 42. 

    A junior Linux system administrator needs to update system software. Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software?

    • A.

      Sudo

    • B.

      Chmod

    • C.

      Grep

    • D.

      Pwd

    Correct Answer
    A. Sudo
    Explanation
    The correct answer is "sudo". The "sudo" command allows a user with the necessary privileges to execute commands as a superuser or another user. In this case, the junior Linux system administrator can use "sudo" to gain the necessary permissions to update the system software.

    Rate this question:

  • 43. 

    A Windows user is attempting to install a local printer and is unsuccessful on permissions. Which of the following user types BEST describes this user?

    • A.

      Guest

    • B.

      Power User

    • C.

      Administrator

    • D.

      Standard User

    Correct Answer
    A. Guest
    Explanation
    The user is described as a "Guest" because they do not have the necessary permissions to install a local printer. Guests typically have limited access and privileges on a Windows system, which would explain their inability to complete the installation.

    Rate this question:

  • 44. 

    A technician is working on a user’s workstation and notices a lot of unknown processes running in the background. The user informs the technician that an application was recently downloaded from the Internet. Which of the following types of infection does the user MOST likely have?

    • A.

      Rootkit

    • B.

      Keylogger

    • C.

      Trojan

    • D.

      Ransomware

    Correct Answer
    A. Rootkit
    Explanation
    The user most likely has a rootkit infection. Rootkits are malicious software that allow unauthorized access to a computer system, often by hiding their presence and granting remote control to an attacker. The presence of unknown processes running in the background indicates that the user's system has been compromised, and the recent download from the internet could have been the source of the rootkit infection.

    Rate this question:

  • 45. 

    Which of the following features has undergone the most significant changes from Windows 7 to Windows 10 and greatly simplified the operating system installation process?

    • A.

      Driver detection

    • B.

      Metro interface

    • C.

      Account control

    • D.

      PXE installation

    Correct Answer
    A. Driver detection
    Explanation
    The feature that has undergone the most significant changes from Windows 7 to Windows 10 and greatly simplified the operating system installation process is driver detection. In Windows 10, the operating system has improved its ability to automatically detect and install the necessary drivers for hardware components, reducing the need for manual driver installation. This simplifies the installation process for users and ensures that their hardware is properly supported by the operating system.

    Rate this question:

  • 46. 

    Which of the following is considered government-regulated data?

    • A.

      PII

    • B.

      End-user license agreement

    • C.

      Digital Millennium Copyright Act

    • D.

      D. DRM

    Correct Answer
    A. PII
    Explanation
    PII, which stands for Personally Identifiable Information, is considered government-regulated data. PII refers to any information that can be used to identify an individual, such as their name, social security number, or financial information. The government regulates the collection, storage, and use of PII to protect individuals' privacy and prevent identity theft or misuse of personal information. Therefore, PII is considered government-regulated data.

    Rate this question:

  • 47. 

    A team needs to deploy a temporary server room at a site to provide support during construction. Which of the following should they use at this site while setting up the server room?

    • A.

      Air filters

    • B.

      Privacy screens

    • C.

      Vacuums

    • D.

      ESD mats

    Correct Answer
    A. Air filters
    Explanation
    During construction, there is a high chance of dust, dirt, and debris in the air, which can be detrimental to the sensitive equipment in a server room. Therefore, the team should use air filters at the site to minimize the risk of these particles entering the server room and causing damage to the servers and other equipment. Air filters will help to maintain a clean and controlled environment, ensuring the smooth functioning of the temporary server room during construction.

    Rate this question:

  • 48. 

    A company has hired a new IT firm to manage its network switches and routers. The firm is geographically separated from the company and will need to able to securely access the devices. Which of the following will provide the ability to access these devices?

    • A.

      Telnet

    • B.

      SSH

    • C.

      RDP

    • D.

      VNC

    Correct Answer
    B. SSH
    Explanation
    SSH (Secure Shell) is the correct answer because it provides a secure and encrypted method for remote access to network devices such as switches and routers. Unlike Telnet, which transmits data in plain text, SSH encrypts the data, making it more secure against eavesdropping and unauthorized access. RDP (Remote Desktop Protocol) and VNC (Virtual Network Computing) are used for remote desktop access and control, not specifically for accessing network devices.

    Rate this question:

  • 49. 

    Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows?

    • A.

      2GB

    • B.

      4GB

    • C.

      8GB

    • D.

      16GB

    Correct Answer
    B. 4GB
    Explanation
    A 32-bit version of Windows has a memory limit of 4GB. This is because 32-bit systems can only address a maximum of 4GB of memory. However, due to hardware and system requirements, the actual usable memory may be slightly less than 4GB.

    Rate this question:

  • 50. 

    A technician is running updates on a Windows PC. Some of the updates install properly, while others appear as failed. While troubleshooting, the technician restarts the PC and attempts to install the failed updates again. The updates continue to fail. Which of the following is the FIRST option to check?

    • A.

      Visit the Microsoft Update website to see if there is an issue with a specific update

    • B.

      Look up the error number associated with the failed update

    • C.

      Look at the system Event Viewer to find more information on the failure

    • D.

      Download the failed update to install manually

    Correct Answer
    A. Visit the Microsoft Update website to see if there is an issue with a specific update
    Explanation
    The technician should first visit the Microsoft Update website to see if there is an issue with a specific update. This is because the website provides information on known issues and solutions for updates. By checking the website, the technician can determine if the failed updates are a result of a known issue and find instructions on how to resolve the problem. This step can help save time and effort in troubleshooting the updates.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 22, 2021
    Quiz Created by
    Themes
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.