dksajpigbdu asdfagdsga
Quiz von , erstellt am more than 1 year ago

Quiz am CompTIA A+ Core 2 (220-1002) Practice Exam, erstellt von dksajpigbdu asdfagdsga am 04/11/2019.

863
0
0
dksajpigbdu asdfagdsga
Erstellt von dksajpigbdu asdfagdsga vor mehr als 4 Jahre
Schließen

CompTIA A+ Core 2 (220-1002) Practice Exam

Frage 1 von 45

1

Which of the following commands will display the MAC address of a computer?

Wähle eine der folgenden:

  • ping

  • netstat

  • ipconfig /all

  • ipconfig /renew

Erklärung

Frage 2 von 45

1

You want to perform a network installation of WIndows. Which of the following must be supported by the client computer?

Wähle eine der folgenden:

  • PCIe

  • PXE

  • BitLocker

  • Multiboot

Erklärung

Frage 3 von 45

1

Which command is used to list the contents of a directory in the Command Prompt?

Wähle eine der folgenden:

  • cd

  • dir

  • ping

  • ver

Erklärung

Frage 4 von 45

1

One of your customers runs WIndows on a laptop. A new security flaw and fix has been published regarding Windows. Which of the following can prevent exploitation?

Wähle eine der folgenden:

  • Encrypting the hard drive

  • Training the customer

  • Implementing a patching policy

  • Configuring screen locks

Erklärung

Frage 5 von 45

1

Your company has multiple users who work with the same commercial software. What is the best type of license to purchase so that it is in compliance with the EULA?

Wähle eine der folgenden:

  • Seat license

  • Commercial license

  • Enterprise license

  • Open source license

Erklärung

Frage 6 von 45

1

Which of the following is a risk of implementing BYOD?

Wähle eine der folgenden:

  • Encryption mismatches

  • Higher risk of phishing attacks

  • Introduction of malware onto the network

  • DHCP failures

Erklärung

Frage 7 von 45

1

One of your co-workers tells you that whenever she returns to her desk she has to type her username and password to unlock the computer. She says she cannot modify the screensaver. After analyzing the system, you notice that the screensaver and the screen lock options are indeed grayed out. Which of the following is most likely the reason for this?

Wähle eine der folgenden:

  • Incorrect local-level user policies

  • Domain-level group policies

  • Antivirus domain-level policies

  • Corrupted registry

Erklärung

Frage 8 von 45

1

Which of the following features in Windows allows the following command to run? (Select the two best answers.)

$PSVersionTable

Wähle eine oder mehr der folgenden:

  • Compatibility mode

  • OneDrive

  • Windows Firewall

  • PowerShell

  • ISE

Erklärung

Frage 9 von 45

1

You have been tasked with printing a group policy configuration report to an HTML file for offline review. Which of the following commands will enable you to do this?

Wähle eine der folgenden:

  • gpresult

  • gpupdate

  • gpedit.msc

  • secpol.msc

Erklärung

Frage 10 von 45

1

Which of the following tasks is automatically added to the Windows Task Scheduler to improve hard disk performance?

Wähle eine der folgenden:

  • cleanmgr

  • defrag

  • diskpart

  • chkdsk

Erklärung

Frage 11 von 45

1

Which of the following is the maximum addressable RAM limit for a system running a 32-bit version of Windows?

Wähle eine der folgenden:

  • No limit

  • 4 GB

  • 8 GB

  • 32 GB

  • 256 TB

Erklärung

Frage 12 von 45

1

One of the users in your company frequently leaves her workstation and wants to make sure that her confidential data is not accessed by someone else. However, the user does not want to turn off the computer when she leaves work in the evening. Which of the following is the best solution for securing the workstation?

Wähle eine der folgenden:

  • Implement a password and fingerprint lock for after-hours login

  • Set a strong password that requires a renewal every 30 days

  • Apply a screen lock after 5 minutes of nonuse and set login time restrictions after hours

  • Run a screensaver after 1 minute of nonuse and a fingerprint lock for after-hours

Erklärung

Frage 13 von 45

1

A manager suspects that a user has obtained movies and other copyright-protected materials through the use of a BitTorrent client. The incident response tech confirms the suspicion, and as such, the user is in violation of the company policy. What should the incident response technician do next?

Wähle eine der folgenden:

  • Immediately delete all unauthorized materials

  • Secure the workstation in a limited-access storage facility

  • Reprimand the user and apply a content filter to the user's profile

  • Document the incident and purge all policy-violating materials

Erklärung

Frage 14 von 45

1

A new user in your company has been given permission to connect to the corporate network with a smartphone that he owns. Which of the following should you perform before configuring the smartphone that he owns. Which of the following should you perform before configuring the smartphone for actual access to the network?

Wähle eine der folgenden:

  • Check the phone for authorized access

  • Erase all personal data from the phone

  • Check the phone for location tracking

  • Disable Bluetooth

Erklärung

Frage 15 von 45

1

You work for an organization that uses various permissions for individual user accounts. One of the managers with a restricted user account receives the following message:
Windows Update cannot currently check for updates because the service is not running.
The manager contacts your organization's help desk to report the error. You connect to the manager's computer and identify the problem. What action should you take next to quickly resolve the problem?

Wähle eine der folgenden:

  • Reboot the computer

  • Roll back the device drivers

  • Restart the network services

  • Rebuild the Windows profile

Erklärung

Frage 16 von 45

1

Which of the following usually incorporates an eight-digit code that can be found on the bottom of a SOHO router?

Wähle eine der folgenden:

  • Port forwarding

  • WPS

  • Wireless encryption

  • Port triggering

Erklärung

Frage 17 von 45

1

You have been asked to set up a new networking closet and you notice that the humidity level in the room is very low. Which of the following tasks should be done before rack-mounting and networking equipment?

Wähle eine der folgenden:

  • Install grounding bars

  • Set up a dehumidifier

  • Use an ESD strap

  • Implement a fire suppression system

Erklärung

Frage 18 von 45

1

Which of the following security techniques is most closely related to when a user enters a username and password once for multiple applications?

Wähle eine der folgenden:

  • Propagation

  • MFA

  • SSO

  • Inheritance

Erklärung

Frage 19 von 45

1

Jason from accounting reports that when pressing Ctrl_Alt_Del to log on to a Windows workstation, he is asked for a PIN. Which of the following should you tell Jason?

Wähle eine der folgenden:

  • "Enter all the passwords that you have used previously"

  • "Reboot the computer"

  • "Check the network cable"

  • "Please verify that you are using your smart card"

Erklärung

Frage 20 von 45

1

A surge suppressor safeguards connected equipment by directing surges to the...

Wähle eine der folgenden:

  • Path of least resistance

  • path of shortest conductance

  • path of lowest inductance

  • path of highest voltage

Erklärung

Frage 21 von 45

1

By default, a file or folder will receive its NTFS permissions from the parent folder. This process is known as which of the following terms?

Wähle eine der folgenden:

  • Permission propagation

  • Single sign-on (SSO)

  • Client-side virtualization

  • Proxy settings

  • Recovery image

  • Inheritance

Erklärung

Frage 22 von 45

1

Which of the following are example of physical security? (Select the two best answers.)

Wähle eine oder mehr der folgenden:

  • Directory permissions

  • OTP hardware tokens

  • Principle of lease privilege

  • Privacy filters

Erklärung

Frage 23 von 45

1

You have been given technical documentation from the network administrator which details the switch ports that you will need to use for an upcoming network upgrade. Which of the following documents did you receive?

Wähle eine der folgenden:

  • Logical topology diagram

  • Process diagram

  • Physical network diagram

  • Fiber backbone diagram

Erklärung

Frage 24 von 45

1

Which of the following will help to protect an organization from further data exposure after a list of passwords has already been leaked due to a policy breach? (Select two best answers)

Wähle eine oder mehr der folgenden:

  • Require strong passwords

  • Use multifactor authentication

  • Educate end users

  • Enable file encryption

  • Restrict user permissions

Erklärung

Frage 25 von 45

1

A user is reporting that his web browser is not going to the site he is trying to access. Which of the following statements describes the best way to resolve this?

Wähle eine der folgenden:

  • Ensure the user is not utilizing a proxy server

  • Remove all internet shortcuts

  • Delete all internet cookies

  • Clear all internet cache

Erklärung

Frage 26 von 45

1

Which of the following Windows features has undergone the most significant changes from Windows 7 to Windows 10 and has also greatly simplified the OS installation process?

Wähle eine der folgenden:

  • Metro interface

  • User Account Control

  • Driver detection

  • PXE installation

Erklärung

Frage 27 von 45

1

Which of the following terms best describes the Apple utility used with iOS devices for synchronizing and upgrading?

Wähle eine der folgenden:

  • Safari

  • iMac

  • iTunes

  • Bluetooth

Erklärung

Frage 28 von 45

1

Which of the following is a way to remove data from a hard drive through destruction? (Select the two best answers)

Wähle eine oder mehr der folgenden:

  • Disabling ports

  • Shredding

  • Drilling

  • Using low-level formatting

  • Purging

Erklärung

Frage 29 von 45

1

Which of the following Internet Options tabs should you access to enable TLS 1.2 in Internet Explorer?

Wähle eine der folgenden:

  • Security

  • Privacy

  • Advanced

  • Connections

Erklärung

Frage 30 von 45

1

You are attempting to install a Windows 10 64-bit OS within a VM but you keep receiving errors. The specifications for the VM include...

Wähle eine der folgenden:

  • Two 1-GHz CPUs

  • 2 GB of RAM

  • 15 GB hard drive space

  • 800 x 600 screen

Erklärung

Frage 31 von 45

1

Your organization's network consists of 25 computers. Your boss is interested in employing a file server with network shares and a print server. Which of the following Windows network setups should you recommend?

Wähle eine der folgenden:

  • Workgroup

  • Ad hoc

  • Star

  • Domain

Erklärung

Frage 32 von 45

1

Which of the following is the best example of the use of chain of custody?

Wähle eine der folgenden:

  • The technician notes the date, time, and who was given the computer.

  • The technician remembers when and who they gave the computer to.

  • The technician uses a third party to hand over the computer to the proper authorities.

  • The technician calls the supervisor after the computer has been transferred.

Erklärung

Frage 33 von 45

1

You just installted a new updated driver for a network interface card (NIC). Now you want to test its data transfer rate. What tool should you use to run your test?

Wähle eine der folgenden:

  • Device Manager

  • Local Security Policy

  • Performance Monitor

  • Component Services

Erklärung

Frage 34 von 45

1

You just got your first IT job working at a help desk. You get a cal from a user about an issue you have never seen before, and you are not sure where to begin troubleshooting. What is the first course of action you should take?

Wähle eine der folgenden:

  • Tell the customer that this is the first time you have encountered this problem and to please be patient.

  • Tell the customer that the problem needs to be escalated to a higher-tier technician.

  • Tell the customer to please hold while a senior technician is consulted regarding the problem.

  • Ask the customer if they would mind holding for no more than two minutes to check resources.

Erklärung

Frage 35 von 45

1

One of your company's users just purchased an Android smartphone and is attempting to access a public hotspot. The user receives a message that a page cannot be displayed. The user notices a question mark in the radio icon in the toolbar. The user has activated Bluetooth and verified that airplane mode is off. Tethering is turned on. The user is using the smartphone to call in to the help desk for assistance. Which of the following is the most likely issue?

Wähle eine der folgenden:

  • The user has exceeded the data allowance

  • There is unauthenticated wireless connectivity

  • It is an un-rooted smartphone

  • The SIM card is not activated

  • The smartphone is only 3G capable

  • A data plan was not purchased

Erklärung

Frage 36 von 45

1

Which Windows utility can be used to see which user is currently logged on?

Wähle eine der folgenden:

  • MSConfig

  • Disk Management

  • Task Manager

  • Administrative Tools

Erklärung

Frage 37 von 45

1

Which of the following tools are commonly used to remove dust from the inside of a computer? (Select the two best answers.)

Wähle eine oder mehr der folgenden:

  • Compressed Air

  • Cotton and alcohol

  • Feather duster

  • Antibacterial surface cleaner

  • Vacuum

Erklärung

Frage 38 von 45

1

You have been tasked with installing Windows 10 on 100 comuter to a new subnet on your network. You are required to remove system-specific identifiers. Which of the following should be used to accomplish this?

Wähle eine der folgenden:

  • System Preparation tool

  • Windows Deployment Services

  • Remote Installation Services

  • Unattended installation

Erklärung

Frage 39 von 45

1

Which of the following is a common symptom of a problem that can occur while starting up the Windows operating system?

Wähle eine der folgenden:

  • Spontaneous shutdown/restart

  • Invalid boot disk

  • WinRE won't start

  • The optical disc failed

  • The emergency repair disk doesn't boot

  • Regsvr32 has failed

Erklärung

Frage 40 von 45

1

Which of the following are possible symptoms of malware? (Selet all that apply.)

Wähle eine oder mehr der folgenden:

  • Security alerts

  • Windows Update failures

  • Pre-installation environment

  • Renamed system files

  • Rogue antivirus

  • User error

Erklärung

Frage 41 von 45

1

One of your company's users complains that his smartphone is making shutter noises even when he is not taking pictures. What should you do first to determine the cause of the problem?

Wähle eine der folgenden:

  • Update all applications on the smartphone

  • Run OS updates

  • UNinstall the camera installation

  • Check the application permissons

  • Reset the phone to factory settings

Erklärung

Frage 42 von 45

1

You are troubleshooting a Windows system suffering from poor performance. The Event Viewer states that the file system is corrupt. What should you do next?

Wähle eine der folgenden:

  • Reload the OS using FAT32 instead of NTFS

  • Run chkdsk with the /R option and reboot the system

  • Open the defrag utility and run the drive analysis

  • Change the drive from basic to dynamic

Erklärung

Frage 43 von 45

1

Which type of fire extinguishing technolgy should be used during an electrical fire?

Wähle eine der folgenden:

  • Overhead sprinkler systems

  • Water-based fire extinguishers

  • Class B fire extinguishers

  • Non-water-based fire extinguishers

Erklärung

Frage 44 von 45

1

You attempt to install a legacy application on a computer running Windows 8. You receive an error that says the application cannot be installed because the OS is not supported. Which of the followin describes the first step you should take to continue installing the application?

Wähle eine der folgenden:

  • Install the latest service pack

  • Install the application in Safe Mode

  • Install the application in compatibility mode

  • Install the latest security updates

Erklärung

Frage 45 von 45

1

You have been tasked with setting up a SOHO wireless network in a small healthcare office that cannot afford a server. The wireless users require the highest level of security available, and various other levels of desktop authentication for access to cloud-based resources. Which of the following protocols and authentication methods should you implement? (Select the two best answers.)

Wähle eine oder mehr der folgenden:

  • WEP

  • WPA

  • WPA2

  • TKIP

  • RADIUS

  • TACACS+

  • SSO

  • Multifactor

Erklärung