0% found this document useful (0 votes)
40 views25 pages

A+ Course Material

The document consists of a series of multiple-choice questions related to IT and computer systems, covering topics such as system configuration, troubleshooting, network management, user account management, and cloud computing. Each question presents a scenario or task that requires knowledge of specific tools, commands, or best practices in IT. The questions are designed to assess the understanding and application of various IT concepts and procedures.

Uploaded by

evandozier7c
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views25 pages

A+ Course Material

The document consists of a series of multiple-choice questions related to IT and computer systems, covering topics such as system configuration, troubleshooting, network management, user account management, and cloud computing. Each question presents a scenario or task that requires knowledge of specific tools, commands, or best practices in IT. The questions are designed to assess the understanding and application of various IT concepts and procedures.

Uploaded by

evandozier7c
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

1.

Danielle a Technician is utilizing "The System Configuration Utility" She wants quick access o
various administrative utilities like Computer Manager, Configuring User Access Control (UAC),
Event Viewer, and Registry Editor. What tab on "The System Configuration Utility" should she
use?
a. General Tab
b. Boot Tab
c. Service Tab
d. Tools Tab
2. Which task management tool do you select to view resource usage?
a. Networking
b. Performance
c. Users
d. Processes
3. Michael a help desk team lead contacts Carolyn the systems administrator because the
technicians are unable to log in to a Linux server that is used to access tools. When Carolyn tries
to use a remote desktop to log in to the server, she sees the GUI cashed. Which of the following
methods or tools can Carolyn use to troubleshoot the server effectively and securely?
a. SFTP
b. Arp
c. SSH
d. VNC
e. Telnet
4. A IT department manager, Danielle wants to insure that past user information is not on any hard
drives that may be repurposed for reuse. She what to ensure that a tool is used to give her team
the most secure way to meet this requirement.
a. Reinstalling Windows
b. Performing a quick format
c. Using disk-wiping software
d. Deleting all files from the command-line interface
5. Willie is having phone issues after installing a new application that claims to optimize
performance. Willie downloaded the application directly from the 3rd party website and is now
experiencing high network utilization and is receiving repeated security warnings. What should
Tami the technician do FIRST to solve or troubleshoot this issue?
a. Reset the phone to factory settings.
b. Uninstall the new application.
c. Increase the data plan limits.
d. Disable the mobile hotspot.
6. Carolyn just got approval from a change management process for change requests on a
software solution. In the change management process, what is the most likely next step that
Carolyn will be taking?
a. End user acceptance
b. Perform risk analysis
c. Communicate to stakeholders
d. Sandbox testing
7. Nina a technician is developing a list of CYOD laptops for the company, which Window
operation system will she include on the list? It must be Windows 10 and it must be able to join
the company domain.
a. Home
b. Windows 10 Education
c. Windows 10 Pro
d. Enterprise
8. Michael is working on see if what if any files are on the D: Which of the Windows command-line
commands which command will he use to change the drive from C: to D:?
a. C:\>D:
b. C:\>[D:]
c. C:\>D:\
d. C:\>cd D:\
9. Moody is working on a system at the command line he wants to insure he is on the correct
system by displaying its name, he chooses a quick command line command. Which command-
line commands can Moody use?
a. host
b. hosts
c. hostname
d. localhost
10. Which Command Prompt command in MS Windows lists the user accounts for the computer?
a. net view
b. net session
c. net user
d. net accounts
11. Teri a system administrator, is troubleshooting a desktop system have connection and share
issues. Teri is at the command line, which tool can she use display group policy information to
verify the system is connected to the correct domain?
a. gpresult
b. net view
c. verify
d. gpupdate
12. What "command-line" utility can partition in windows?
a. sfdisk
b. diskutil
c. gpart
d. diskpart
13. Mary needs to reset the DHCP configuration settings for all adapters in MS Windows, She is
going to perform this reset from the command prompt which two commands can she use to
reset the DHCP configuration
a. ipconfig /disable
b. ifconfig eth0 down
c. ipconfig /release
d. ipconfig /enable
e. ifconfig eth0 up
f. ipconfig /renew
14. Danielle is at the command prompt she needs to disable Eve Smith’s user account, what net
user command can she use?
a. Net user esmith Pa$$w0rd/add/fullname "Eve Smith"/logonpasswordchg:yes
b. Net user esmith /active:no
c. Net user esmith
d. Net localgroup Administrators esmith /add
15. Michael is looking at configuring folder redirection. He is following Microsoft's suggested order,
which of these steps is the second thing he should do?
a. Create a security group for folder redirection and add group members.
b. Configure Offline Files for folder redirection.
c. Create a network file share to use for folder redirection.
d. Create a folder redirection group policy object.
16. What is the folder permission that can create new folders and files, change attributes, view
permissions, and ownership?
a. Read
b. Write
c. Read & Execute
d. Modify
17. Tanya wants to set up Active Directory, this is one of the basic administrative steps before can
create the client-server, model in Windows client/server networking.
a. Member Servers
b. Organizational Units (OUs)
c. Domain Accounts
d. Domain
18. Mark is set up systems in a small business, he was them to get up and running quickly, so he is
going to let the system configure the Windows network type that a system is a member of by
default and allows the ability to share resources such as folders, files, and printers. What
network type did Mark let windows set up?
a. Homegroup
b. Peer-to-peer network
c. Workgroup
d. Network and Sharing Center
19. There are two types of accounts in the window-based network. What two are they?
a. Local Accounts
b. Active Directory
c. Domain Accounts
d. Member Servers
20.

The CFO then reported this incident to Vanessa. This happens when The CFO when to the bank’s
website. What should Vanessa do FIRST?
a. Update the browser's CRLs.
b. File a trouble ticket with the bank.
c. Contact the ISP to report the CFO's concern.
d. Instruct the CFO to exit the browser.
21. Nina the technician set up a new laptop for Dan who is visually impaired and requires a different
cursor color. Which of the following OS utilities can Nina use to change the color of the cursor?
a. Keyboard
b. Touchpad
c. Ease of Access Center
d. Display settings
22. The sales manager, Cheryl reports that his staff members often forget the passwords to their
mobile devices and applications. Cheryl is having a conversation with Carolyn on how many
tickets these are generating, Carolyn has a way of reducing the number of tickets. What is the
BEST way for Carolyn to reduce the number of times employees forget passwords and make it
easy to log into these mobile devices and applications?
a. Enable multifactor authentication.
b. Increase the failed log-in threshold.
c. Remove complex password requirements.
d. Implement a single sign-on with biometrics.
23. Cay a call center technician receives a call from a user Joe asking how to update Windows. How
should Cay respond to Joe?
a. Have the user consider using an iPad if the user is unable to complete updates.
b. Have the user text the user's password to the technician.
c. Ask the user to click in the Search field, type Check for Updates, and then press the
Enter key.
d. Advise the user to wait for an upcoming, automatic patch.
24. Carolyn needs to format a USB drive to transfer 28 GB of data from a Ubuntu computer to a
Windows 10 computer. What filesystem will Carolyn MOST likely use?
a. FAT32
b. ext4
c. NTFS
d. exFAT
25. Danielle is preparing to replace a faulty power supply unit in a desktop computer. Based on the
Safety procedure document by CompTIA What is Danielle's first step?
a. Remove the CPU to prevent ESD damage.
b. Remove all jewelry that may come into contact with components.
c. Locate the toxic waste instructions for the PSU.
d. Ask a coworker to assist in the repair.
26. Carolyn has a cable is running along the floor between Engineering and Accounting where there
is foot traffic. Which of the following steps should be taken first?
a. Cable management is what she should implement.
b. Removal of the Cable
c. Place the Cable up over this foot traffic
d. Call the management company for the building
27.

Windows 10, adds a new method of accessing all the Windows settings on the systems the
image above is a screenshot of this new interface. What is this interface called?
a. Control Panel
b. Administrative Tools
c. Computer Management console
d. Settings app
28. When working with her customers, Danielle should always try to keep a positive attitude.
Danielle knows this is important and it also does what?
a. establish a good customer relationship.
b. Helps the customer feel confident she can fix the problem.
c. Proves she has the knowledge needed to fix the problem.
d. to be more reliable.
29. Eric is working at the help desk when he receives a call from a client about an issue with the
company’s email. The customer is very upset about the email issue. He is complaining about the
email service and the IT department in general. What is the best way for Eric to defuse the
situation?
a. Defend the IT department.
b. Hang up the phone.
c. Call the supervisor and ask for help with the customer.
d. Let the customer vent and then restart the conversation.
30. David is working on a Visio in a design project. He wants to keep this program showing on the
entire desktop, but he also needs to have several other applications open so he can research
and search for solutions for this project. What function and accessibility for the taskbar will let
David have Visio on a Full screen, and get access to the other application?
a. Snap Assist
b. PowerShell
c. Task View
d. Live tiles
31. Linda has just completed installing Windows 10 and needs to install several applications on the
computer before returning it to her client. What should Linda check prior to installing the
applications? (Choose two)
a. System requirements
b. Network status
c. Hard drive space
d. CPU priority
32. Carolyn is preparing to install Windows 10 on a system that has a version of Windows 8.1
installed. This version of Windows 8.1 runs slowly and crashes occasionally. The optical drive
also does not work, so Carolyn decides to use a flash drive to install Windows 10. Carolyn wants
to remove all the programs and data from the computer and start over with Windows 10. What
type of installation should Carolyn perform?
a. In-place upgrade
b. Repair installation
c. Recovery installation
d. Custom installation
33. Michael would like to install a new application on every computer in a SOHO network. All the
computers are currently connected to a workgroup. What is the easiest and best way for
Michael to install the application on all the computers?
a. Have a USB device and go to every computer.
b. Have multiple copies of the software on a DVD and install it on each computer
c. Go to the Windows Store and install the software on each computer.
d. Use a network share to share the installation files.
34. What is it called when software is used to simulate the hardware of a physical computer? Also
has two types.
a. Dual boot
b. Windows Run as Administrator
c. Virtual machine
d. Compatibility mode
35. Doug wants to install a new OS without deleting the old one so that you can boot to either OS,
what type of boot setup did Doug set up?
a. Dual
b. Cross
c. Controlled
d. Selective
36. Carolyn is using "Windows Settings" (Setting app) what is the path that she can use to copy
important information about a PC and send it to a Senior level technician to assist her with
troubleshooting?
a. System > About
b. Network & Internet > Ethernet
c. Ease of Access > Narrator
d. Privacy > Diagnostics & Feedback
37. Which window would you navigate to in order to modify the virtual memory settings in
Windows?
a. Network & Internet
b. Performance Options
c. Devices
d. Device Manager
e. Display
38. Shawn’s computer is displaying a black screen. Carolyn’s technical support restarts the
computer, but the OS still does not load. Carolyn discovers the OS was patched the previous
evening. What should Carolyn do Next?
a. Reboot into safe mode and roll back the updates
b. Repair the Windows Registry
c. Configure boot options in the BIOS
d. Disable Windows services and application
39. A Cay's computer becomes infected with malware, which manages to steal all credentials stored
on her PC. It then uses elevated credentials to infect all other systems in her office. Joe a
technician is looking for a solution to prevent this from reoccurring. which solution should Joe
consider?
a. a host-based IDS
b. Disallow the password caching of accounts
c. an antivirus product with heuristic analysis
d. a UTM in between PC endpoints to monitor for suspicious traffic
e. a system of all logs of all failed login attempts forwards findings to a central server
40. A company brings in contractors several times a year to perform inventory, and the contractors
use company-supplied laptops. The company’s security policy states that once the inventory is
completed, the contractors should not be able to log in to the laptops until the next inventory.
Which of the following BEST enforces this policy?
a. Delete the user accounts
b. Disable the user accounts
c. Restrict the user accounts
d. Reset the user accounts
41. Steve’s smartphone is making the camera shutter noise even when he is not taking pictures.
When he opens the photo album, there are no new pictures. Which of the following steps
should be taken FIRST to determine the cause of the issue?
a. Uninstall the camera application
b. Check the application permissions
c. Reset the phone to factory settings
d. Update all of the applications on the phone
e. Run any pending OS updates
42. A small business has an open wireless network so vendors can connect to the network without
logging in. The business owners are concerned that a nearby company is connecting and using
the wireless connection without permission. If the small business requires that the network
remain open, which of the following configuration settings should be changed to address these
concerns?
a. Default SSID
b. MAC filtering
c. Power levels
d. Content filtering
e. Firewall
43. Which of the following cloud computing characteristics measures resources through metering
on a per-use basis?
a. Broad network access
b. Rapid elasticity
c. On-demand self-service
d. Measured service
44. When configuring Microsoft Hyper-V as a hypervisor, three types of virtual switches can be
created. Which type is used by the virtual machine and the host only?
a. Internal
b. Private
c. External
d. Emulated
e. Global
f. Host
45. In a virtualization environment, a host-based or where an OS already exists hypervisor is which
type of hypervisor?
a. Type 1
b. Type 2
c. Emulated
d. Bare metal
46. In a cloud computing environment, which type of service would include the configuration of
virtual gateways, virtual private networks, virtual servers, and virtual switches?
a. SaaS
b. PaaS
c. IaaS
d. VDI
47. Which of the following cloud computing models has a cost that is shared between several
organizations or groups?
a. Hybrid
b. Private
c. Public
d. Community
48. Which of the following cloud computing characteristics allows resources to be provisioned to
scale up or down as required by the customer?
a. Resource pooling
b. Measured service
c. Rapid elasticity
d. On-demand self-service
49. Carolyn wants to use a Time Machine backup to install a new copy of the macOS onto a Mac.
Which of the following tools will Carolyn use to perform this task?
a. Disk Utility
b. Boot Camp
c. macOS Recovery
d. Mission Control
50. Which of the following describes the macOS feature that lets you use finger motions to perform
functions, for example, spreading two fingers to zoom in?
a. Gestures
b. Snapshots
c. Spotlight
d. Finder
51. John is logged in to a Linux computer as John and needs to reset group ownership for the file
report.txt in the John home directory. Which of the following commands will perform this
function?
a. cd
b. ps
c. chown
d. clear
52. A technician is logged in to a Linux system with a user account that has been assigned root
privileges. Each time the technician attempts to run a specific terminal command, a “Permission
denied” message is displayed. What is the most likely reason for this message?
a. The software repository is out of date and needs to be updated.
b. The command syntax needs to be verified.
c. The user account is not assigned a password.
d. The command needs to be preceded by sudo.
53. A Linux user needs to find all instances of the word admin in /var/log/auth.log. Which of the
following commands will perform this function?
a. grep
b. ls
c. rm
d. cp
e. apt-get
54. A Teri needs to boot macOS over the network using an image stored on a server. What Apple
technology will best assist Teri?
a. Swap partition
b. NetBoot
c. HFS+
d. Key Chain
55. A Danielle system administrator is selecting an operating system for use by the company’s
research and development team. The team requires an OS that can be easily modified and
changed to meet its particular requirements. Which of the following operating systems will be
the best choice for the users?
a. Windows 10 Enterprise
b. Mac OS X
c. Linux
d. Windows 7 Professional
56. Which Default OS will Bill and Technician in installed on Sally’s new Chromebook.?
a. macOS
b. Google OS
c. Chrome OS
d. Windows 10
57. Rafal is working on the Powershell script what is the default script file it will be saved as?
a. .bat
b. .ps1
c. .sh
d. .py
58. Patrick is researching some security alternatives for his network, which of the following can
provide some protection for Patrick's network from outside invaders? (Choose three)
a. Firewalls
b. Class 3 modems
c. Class 2 modems
d. Packet-Filtering Routers
e. Hidden Files
f. Proxy Servers
59. David found out that there is a windows machine having a startup issue. Which utility can David
use for troubleshooting?
a. Task manager
b. Registry edits
c. Check disk
d. MSConfig
60. Which of the following bootrec commands is used to rebuild the master boot record for the
system partition?
a. bootrec /fixboot.
b. bootrec /fixmbr.
c. bootrec /scanos.
d. bootrec /rebuildbcd.
61. Which of the following commands can Michaela use to create a file in macOS?
a. touch.
b. rm.
c. cp.
d. mv.
62. Carolyn a technician is working on Michaels's Windows 10 PC. Michael is indicating the system is
running slowly and not responding quickly. Carolyn wants to try to utility to see if this will solve
Michael’s PC issues, which two commands can she use?
a. dir
b. chkdsk
c. dism
d. ipconfig
e. format
f. diskpart
63. Mark an administrator is setting up a service and he wants to have a thermal server with the
utmost security. Mark knows two methods that may help him secure the service, and which
methods should Mark use?
a. Change the default access port
b. Enforce password complexity
c. Put the terminal server into the router’s DMZ
d. Disable logon time restrictions
e. Block all unused ports on the LAN
f. Use the local CAs for server authentication
64. Gloria receives an invalid certificate error when visiting a website with port 443 enabled. Other
computers on the same LAN do not exhibit this symptom. Which of the following needs to be
adjusted on the workstation to fix the issue?
a. Date and time
b. UEFI boot mode
c. Logon times
d. User access control
65. Tami's IT department set up a proxy server to manage its Internet. She is configuring the
Windows workstations to use the new proxy server. Which Control Panel utilities should Tami
use to configure the setting?
a. Internet Options – Advanced
b. Internet Options – Connections
c. Internet Options – Security
d. Internet Options – Content
e. Internet Options – Privacy
66. Which of the following security methods BEST describes when a user enters a username and
password once for multiple applications?
a. SSO
b. Permission propagation
c. Inheritance
d. MFA
67. Ben is working with a customer PII information on a member of HR Andrea, Andrea understands
that the company wipes the phone. She asks what should she do so this becomes a last resort
Ben suggests the BEST method of securing the phone is?
a. Fingerprint lock
b. Passcode lock
c. Swipe lock
d. PIN lock
68. Lynn is setting up a kiosk. She needs to ensure the kiosk is secure and users will have access to
only the application needed for customer interaction. Lynn must also ensure that whenever the
computer is rebooted or powered on it logs in automatically without a password. Which of the
following account types would the technician MOST likely set up on this kiosk machine?
a. Guest
b. Administrator
c. Power User
d. Remote Desktop User
69. Carolyn is set up a "Welcome screen" for all new employee’s PC installs where the employee will
not be asked questions during set up. The answers are coming from an answer file. What type
of install is Carolyn setting up to install the OS?
a. Clean
b. Unattended
c. Repair
d. Upgrade
70. IT Admin is PXE booting a computer. Which of the following is TJ MOST likely performing on the
computer?
a. Image Deployment
b. Multiboot configuration
c. In-place upgrade
d. System Repair
71. Gray is asking Carolyn about the system that has two sets of interlocking doors inside a small
space, where the first set of doors must close before the second set opens. What is Carolyn's
answer to Gray?
a. Tailgating
b. Mantrap
c. Security Guards
d. Multifactor
e. Solution
72. Brianna is a security specialist, she is set a logical security technology designed to prevent
malicious software from running on a host and can establish a security system that does not
entirely depend on the good behavior of individual users. What type of system is Brianna setting
up
a. Trusted/Untrusted Software Sources
b. Disable Auto Run
c. Anti-Virus/Anti-Malware
d. Execution Control
73. There are several approaches to the problem of data remnants on magnetic disks. If a disk can
be recycled or repurposed, destruction is obviously not an option so what do you do instead?
a. Physical Destruction
b. Remnant Removal
c. Overwriting/Disk Wiping
d. Low-Level Format
74. Which of the following refers to capturing and reading data packets as they move over the
network?
a. MAC Flooding
b. ARP Poisoning
c. MITM
d. Eavesdropping
75. Which of the following refer to stealing a password or PIN, or other secure information, by
watching the user type it?
a. Tailgating
b. Impersonation
c. Shoulder Surfing
d. Pharming
76. What utility would you use to view current connections and active sessions and ports on a
computer?
a. nslookup
b. netstat
c. ping
d. ipconfig
77. Which of the following utilities can you use from the command line on a Linux system to see a
list of the installed network interfaces along with their current status and configuration?
a. ipconfig
b. netinfo
c. netconfig
d. ip
78. Which of these network utilities sends an ICMP echo request/reply packet to a remote host?
a. tracert
b. nslookup
c. netstat
d. ping
79. This network utility tests connectivity between devices and shows the routers in the path
between the two devices. (How many hops?)
a. ipconfig
b. nslookup
c. netstat
d. tracert
80. Which network utility resolves or looks up the IP address of the specified hostname? (like
getcertified4less.com)
a. netstat
b. nslookup
c. ping
d. ipconfig
81. Your company hosts its own web server, and it allows consumers to make purchases via the
server. The helpline has been getting complaints that users are unable to access the secure
portion of the website. You open the site and it seems fine, although the secure portion where
transactions are completed is inaccessible. What is the most likely cause?
a. The firewall is blocking TCP port 80.
b. The firewall is blocking TCP port 443.
c. The security module of the web server is malfunctioning.
d. The web server is down.
82. Which of the following connections provide data with the MOST secure protection from
interception?
a. Wired
b. WiFi
c. IR
d. Cellular
83. Acronym for TCP is ........
a. Transmission Control Program
b. Transmission Control Protocol
c. Transport Control Protocol
d. Transport Control Program
84. A user is unable to show an Android smartphone display on a TV. Which of the following settings
should the technician check to resolve this issue?
a. Multi-window
b. Air view
c. Air browse
d. Screen mirroring
85. What is the science of collecting evidence from computer systems to a standard that will be
accepted in a court of law?
a. Latent
b. Incident
c. Whistleblower
d. Forensics
86. You have been tasked with fixing a problem on a Windows server. You need to find out which
switch it connects to and how it connects. Which of the following types of documentation
should you consult?
a. Microsoft Knowledge Base
b. Network topology diagram
c. Incident documentation
d. Compliance policy
e. Inventory management
87. Michael have been tasked with adding a group of Windows client computers with a new image
configuration to the IT asset inventory database, and this task has a standard procedure.
Michael must furnish a document to be signed off by two people. Who should he approach for
signatures? (choose two.)
a. Michael’s manager
b. Compliance officer
c. IT director
d. Owner of the company
88. What do inventory management systems and software used to keep track of assets? (Choose
two.)
a. Regulatory policies
b. AUPs
c. Asset tags
d. Barcodes
89. In a change management board meeting, Teri is discussing any vulnerabilities that can be
mitigated as part of a recommended change and anything that could potentially occur due to
that change. What best describes what Teri is discussing?
a. Purpose of change
b. Scope of the change
c. Backout plan
d. Document changes
e. Risk analysis
90. Sarah is working with servers and network infrastructure in an IT department. She is proposing a
major operating system upgrade to a Linux server. She has completed the documentation for
this, and it shows that the upgrade will impact your organization’s web services. She finishes the
required risk analysis and documents the processes that will be required. Which of the following
should she complete next?
a. Rollback plan
b. Change request
c. Purpose of the change
d. Scope of the change
91. Dana has implemented a backup solution that combines a full backup on Sunday at 6 p.m. and
incremental backups on Monday through Friday at 6 p.m. If there was a storage drive failure on
Saturday morning, how many backup tapes would be required to restore the entire backup?
a. 5
b. 2
c. 4
d. 6
92. If a power supply fails, what should you do?
a. Replace it.
b. Repair it.
c. Use a different computer.
d. Switch it to a different voltage setting
93. Shawn walks into the server room and sees Vikki lying on the floor with a live electrical wire
draped over her. What should Shawn do first?
a. Run out and call 911.
b. Grab the wire and fling it off the Vikki.
c. Grab Vikki and drag her out from under the wire.
d. Grab a piece of wood and use it to move the wire off, Vikki
94. You find illegal materials on a customer’s computer. Your boss commands you to preserve
computer evidence until he gets to the scene. What is your boss asking you to begin?
a. Documentation
b. Chain of custody
c. First response
d. GDPR compliance
95. Which type of regulated data is specifically protected under the HIPAA Privacy Rule?
a. PII
b. PCI
c. GDPR
d. PHI
96. Which of the following is an integer?
a. 16
b. cat
c. string
d. 0.00000001
97. You want to list a variable number 12 times but don’t want to type 12 lines of code. Which of
the following techniques should you use?
a. if-then
b. Looping
c. Environment variables
d. Comment syntax
98. A new Craft Shop will be using credit cards in a physical location as well as its web presence.
Which of the following does the business need?
a. PHI certification
b. PCI compliance
c. POTS implementation
d. PII filtering
99. Nina just finished scripting a sequence of code and saved the script as a .sh file. What system is
Nina working in?
a. PowerShell
b. JavaScript
c. Linux
d. Python
e. Ruby
100. Which program enables a user to invite a technician to help repair their computer
remotely?
a. Remote Desktop Connection
b. Remote Assistance
c. RDP
d. Remote connectivity
q1 D

The Tools tab contains shortcuts to various administrative utilities including


System Information, Configuring UAC and Registry Editor.
q2 B

The Performance tab is used to view resource usage.


q3 C The Secure Shell Protocol (SSH) is a cryptographic network protocol for operating
network services securely over an unsecured network. Its most notable
applications are remote login and command-line execution.
q4 C Data destruction software also referred to as data wiping, data erasure, or data
sanitization software, is used to fully delete electronic data from storage devices in
a way that it is not recoverable with the help of data recovery software.
q5 B One the step is to go back to the configuration that causes the issues in this case
the application needs to be uninstalled
q6 A User Acceptance Testing, also a beta testing, is the final step in the change
management process where a proposed strategy, technology implementation or
product is tested with a group of individuals that are representative of the
audience that will be affected by or utilize a new system
q7 BCD Microsoft provides the join a domain option on three versions of Windows 10.
Windows 10 Pro, Windows Enterprise, and the Windows 10 Education.
q8 A
q9 C

q10 C

q11 A
q12 D

q13 CF

q14 B Net user esmith/active:no, an administrative command prompt that will disable
the esmith account.
q15 C Logged in as an administrative user the second step in configuring folder
redirection is to create a network file share to use for folder redirection.
q16 B The folder permission Write creates new folders and files, changes attributes,
views permissions, and ownership but as file permission can overwrite the files
and view attributes, ownership, and permissions.
q17 D The first thing you have to create a Domain. This is done by creating a domain
controller. Microsoft Servers, a domain controller (DC) is a server computer that
responds to security authentication requests (logging in, etc.) within a Windows
domain. A domain is a concept introduced in Windows NT whereby a user may be
granted access to a number of computer resources with the use of a single
username and password combination. The domain is the basic administrative
building block in Windows client/server networking. To create a domain, you need
one or more Windows servers configured as domain controllers.
q18 C Workgroup is a type of network under Windows that a user can decide to give
others access to files on his or her PC or to printers that are attached to it.
q19 AC Don't confuse local accounts with domain accounts. Local accounts are stored on
computers and only apply to the security of those machines. Domain accounts are
stored in Active Directory, and security settings for the account can apply to
accessing resources and services across the network. Local accounts are stored in
the Local Security Accounts database known as the Security Account Manager
(SAM), stored in the registry, as a subkey of HKEY_LOCAL_MACHINE. Domain
accounts are stored in the Active Directory (AD) on a Windows Server Domain
Controller (DC). These accounts can be accessed from any computer joined to the
domain.
q20 A A certificate revocation list (CRL) is a list of digital certificates that have been
revoked by the issuing certificate authority (CA) before their actual or assigned
expiration date. To refresh the CRL on the master server, follow these steps: After
you revoke a host's certificate, wait 5 minutes for the CRL to update in the web
server.
q21 C

q22 D NIST SPECIAL PUBLICATION 1800-13B: Mobile Application Single Sign-On with
Biometrics is an excel way to improve authentication on mobile devices
q23 D Advise the user to wait for an upcoming, automatic patch. Windows Update for
Business allows the company to keep Windows version or later devices in your
organization always up-to-date with the latest security defenses and Windows
features when these devices connect directly to the Windows Update service.
q24 C NTFS is the windows OS preferred filesystem, Ubuntu is capable of reading and
writing files stored on Windows formatted partitions. These partitions are
normally formatted with NTFS.
q25 B Working inside a computer case, it is recommended that all jewelry should be
removed that may come into contact with computer components. Most jewelry is
metal and conducts electricity.
q26 A Implement cable management to remove the risk of tripping
q27 D The screen shown is the setting apps ( window settings)
q28 A When you display a positive attitude, it helps you establish a good customer
relationship.
q29 D Let the customer vent and then restart the conversation
q30 C Windows 10 uses Task View to create multiple virtual desktops and will enable
Manuel to flip through to the desired desktop as needed. The Task View is on the
Taskbar if not visible it can be toggled on.
q31 AC make sure that the RAM, CPU, and video graphics required to run the application
are available and that the required amount of hard drive space is available to
install the program.
q32 D Carolyn wants to do a custom installation, also known as a clean installation. A
custom installation will delete all the programs and files on the PC.
q33 D Using a network share allows Michael to share the installation files from one
location to all the computers on the network.
q34 C A virtual computer, or virtual machine (VM), is software that simulates the
hardware of a physical computer. There are two main hypervisor types, referred to
as “Type 1” (or “bare metal”) and “Type 2” (or “hosted”).
q35 A A dual boot, or multiboot, allows you to install a new OS without deleting or
changing the old one so that you can boot to either OS
q36 A Navigate to Windows Settings > System >
About. Here you can copy device and Windows
specifications and paste them into an email or
to another location.

q37 B Navigate to the Performance Options dialog box and then click the Advanced tab
to modify virtual memory in Windows. To access that window from the System
Properties dialog box, click the Advanced tab, select the Performance section, and
then click the Settings button.

Window setting>System>About>System Info>Advance>Proformance


Settings>Advance> Virtrual Memory
q38 A Hold the power button as your computer is booting(Open in a new window) to
turn it off, then turn it back on. This should bring you to Windows' recovery
options, just like when you boot into Safe Mode. Only this time, head to
Troubleshoot > Advanced Options and choose Uninstall Updates
q39 C Antivirus heuristic analysis helps software providers stay one step ahead by
detecting viruses that were previously unknown and defending against new
malware that has not yet been added to virus definition files.
q40 B to disable an account go to “Computer Configuration” “Windows Settings”
“Security Settings” “Local Policies” and “Security Options”. In the right pane,
double-click the “Accounts: Guest Account Status” policy. Select the “Define this
policy setting” checkbox and click “Disabled
q41 B Permissions are a means of controlling and regulating access to the specific
system- and device-level functions by software
q42 C It even makes sense to start with minimum power and increase it until the
necessary area is covered. In a congested environment, it doesn’t matter if your
access point is stronger than the neighbors. If your AP can receive other APs then it
will share the air time with them by taking turns. All APs on the same channel will
give other APs equal access to the spectrum. This is how 802.11 was written.
q43 D Measured service is a cloud computing characteristic where resources are
measured through metering on a per-use basis. Network bandwidth usage is an
example of a potentially measured resource.
q44 A Internal virtual switches found in the Hyper-V hypervisor are used to establish
network communication between guest virtual machines and the host.
q45 B A type 2 hypervisor runs on an operating system and is known as a host-based
hypervisor. VMware workstation(PC) VMware Fusion (Mac), Parallels, and Virtual
Box are examples
q46 C Infrastructure as a Service (IaaS) is a cloud computing solution that allows for the
creation of a data center in the cloud. This includes configuring servers, switches,
gateways, and other common physical infrastructure objects as virtualized versions
in the cloud.
q47 D A community cloud computing model is a private cloud with shared costs between
different organizations that have similar concerns.
q48 C Rapid elasticity in cloud computing refers to the cloud's capability to scale quickly
to meet demand. Consumers benefit from rapid elasticity because they can
expand or reduce their resources how and when they would like.
q49 C Using the macOS Recovery tool, Carolyn can reinstall the macOS from the Internet
or from a Time Machine backup. She can also erase the HDD before reinstalling the
OS.
q50 A Gestures are finger actions that are used to perform actions on a computer.
q51 C The chown command is used to change the
owner of a file or directory.

q52 D The sudo (substitute user) command


is used to perform a command as a
superuser when logged in as a normal
user.
q53 A The grep command is used to
search a text-based file line-by-
line for a specific pattern.

q54 B A NetBoot image can be used to start an entire Mac operating system over the
network. Simply using a NetBoot image does not replace the OS on the computer.
q55 C Linux is an open-source operating system that can be modified as required. The
Linux kernel community welcomes transparent research on the Linux kernel, the
activities involved in producing it, and any other byproducts of its development.
Linux benefits greatly from this kind of research, and most aspects of Linux are
driven by research in one form or another.
q56 C The Chromebook will come installed with Google’s Chrome OS by default. The
Chrome OS is based on the Linux kernel. The open-source, development version of
Chrome OS is called Chromium OS.
q57 B PowerShell most commonly saves scripts in *.ps1, *. psm1, and *.psd1 formats.
q58 ADF Firewalls, Packet-Filtering Routers, and Proxy Servers.
A firewall and a proxy server are both parts of a network's security. Firewalls and
Packet-Filtering Routers can prevent unauthorized access to your computer by
blocking ports and programs, whereas proxy servers effectively hide your internal
network from the Internet.
q59 D MS config (System Configuration) is used to troubleshoot startup issues in the
Windows operating system.
q60 B bootrec /fixmbr command is used to rebuild the master boot record for the system
partition.
q61 A In computing, touch is a command used to update the access date and/or
modification date of a computer file or directory.
q62 BC Checks the file system and file system metadata of a volume for logical and
physical errors. If used without parameters, chkdsk displays only the status of the
volume and does not fix any errors. If used with the /f, /r, /x, or /b parameters, it
fixes errors in the volume. Deployment Image Servicing and Management
(DISM.exe) is a command-line tool that can be used to service and prepare
Windows images.
q63 CE The De-Militarized Zone (DMZ) feature on your router forwards all inbound traffic
to a specified IP address on your local network. A simple method that many
administrators use to help secure the network from unauthorized access is to
disable all unused ports on a switch.
q64 A If a website presents a certificate with validity dates that don't match the date on
your computer's clock it will cause an error. The issues can be fixed by setting the
correct date, time, and time zone on your computer system.
q65 B In the Internet Options, go to Connections > LAN
settings.

q66 A Single sign-on (SSO) is an authentication method that enables users to securely
authenticate with multiple applications and websites by using just one set of login
credentials.
q67 A A fingerprint door lock utilizes an electronic locking system to gain access. It is a
type of intelligent lock with which you don't have to have a key or a magnetic card
to be in your possession when entering locked premises. Instead, you will present
a registered biometric fingerprint.
q68 A Any files created by the guest are stored temporarily, then deleted when they log
off.
q69 B
The installation of a program without requiring the user to select options or click
Next at the end of each step. Unattended installations often use a file of
predefined answers so that after starting the installation, it runs to completion
without further user intervention.
q70 A Image deployment is an image of a computer software environment that deploys
to multiple machines remotely through the network. A preboot execution
environment (PXE), is a set of standards that enables a computer to load an
operating system (OS) over a network connection.
q71 B A mantrap, security mantrap portal, airlock, sally port, or access control vestibule
is a physical security access control system comprising a small space with two sets
of interlocking doors, such that the first set of doors must close before the second
set opens.
q72 D Execution control refers to logical security technologies designed to prevent
malicious software from running on a host. Execution control can establish a
security system that does not entirely depend on the good behavior of individual
users.
q73 C Overwriting/Disk Wiping software ensures that old data is destroyed by writing to
each location on the media, either using zeroes or in a random pattern.
q74 D Eavesdropping refers to capturing and reading data packets as they move over the
network. When an attacker has gained access to the network, the attacker can use
a packet sniffer such as Wireshark to capture live network traffic.
q75 C Shoulder surfing refers to stealing a password or PIN, or other secure information,
by watching the user type it. The attacker could use high-powered binoculars or
CCTV to directly observe the target from a remote location.
q76 B netstat provides statistics about all active connections so you can find out which
computers or networks a PC is connected to.
q77 D An ip command is a powerful tool for configuring network interfaces that any Linux
system.
q78 D ping is a computer network administration software utility used to test the
reachability of a host on an Internet Protocol network
q79 D The Traceroute command (tracert) is a utility designed for displaying the time it
takes for a packet of information to travel between a local computer and a
destination IP address or domain.
q80 B nslookup is the name of a program that lets an Internet server administrator or
any computer user enter a hostname (for example, "getcertified4less.com") and
find out the corresponding IP address or domain name system (DNS) record.
q81 B you can use netstat command to list the tcp port, if 443 port is listed there and the
state is established means 443 is open for outbound communication. if not is
blocked This is HTTPS (port 443), you will not be able to access secure websites
q82 A Wired networks are more secure than wireless networks. This is due to the fact
that your network is only accessible with a physical cable connection. With
wireless networks, the Wi-Fi signal is broadcasted outside of the building, leaving it
open to the public and potential hackers.
q83 B Transmission Control Protocol (TCP) is a standard that defines how to establish and
maintain a network conversation by which applications can exchange data.
q84 D Screen mirroring allows you to project the content currently displayed on your
smartphone, tablet, or computer screen to another screen or digital sign
wirelessly.
q85 D Forensics is the science of collecting evidence from computer systems to a
standard that will be accepted in a court of law.
q86 B Use a network topology diagram. This documentation should graphically map out
what switch the server connects to and how.
q87 AC The IT director and Micheal Manager should be aware of anything substantial
being added to the network as assets. You might also have a project manager, or
someone in asset management or other departments, sign off as well.
q88 CD Asset tags and barcodes are used in inventory management systems and software
to identify and keep records of company assets.
q89 E Teri is discussing risk analysis, which is the attempt to determine what threats
could occur with computers and networks.
q90 B Sarah will need to fill out a change request form. This and any supporting
documentation and assessments will be presented to a change control board or
committee. This document needs to be approached from a business standpoint
and written in a way that Sarah’s steam, and management, can read easily.
q91 D Dana would need all 6 backup tapes to restore the entire backup. That would
include the full backup from Sunday, and the five incremental backup tapes from
Monday through Friday
q92 A Replacing the power supply is a safe process to proceed with.
q93 D The FIRST thing you should do is get a wooden stick, rope, or something similar
and use it to CAREFULLY move the wire off of the Vikki, After the wire is removed,
Shawn should call 911 and then attempt to offer first aid to the Vikki.
q94 B Your boss is asking you to begin the process of a chain of custody, which is a
chronological paper trail of evidence.
q95 D Protected health information (PHI) is information that is protected under the
HIPAA Privacy Rule.
q96 A The number 16 is an integer
q97 B A looping, which allows you to write one line of code based on math that will
output the 12 lines of code required.
q98 B Payment card industry (PCI) compliance is mandated by credit card companies to
help ensure the security of credit card transactions in the payments industry
q99 C Nina is working on a Linux system and making use of Bash. The best practice is to
save Bash scripts as .sh files.
q100 B Remote Assistance (Quick Access) calls can be made from users to invite other
users to help fix problems for them

You might also like