dksajpigbdu asdfagdsga
Quiz por , criado more than 1 year ago

Quiz sobre CompTIA A+ Core 2 (220-1002) Practice Exam, criado por dksajpigbdu asdfagdsga em 04-11-2019.

871
0
0
dksajpigbdu asdfagdsga
Criado por dksajpigbdu asdfagdsga quase 5 anos atrás
Fechar

CompTIA A+ Core 2 (220-1002) Practice Exam

Questão 1 de 45

1

Which of the following commands will display the MAC address of a computer?

Selecione uma das seguintes:

  • ping

  • netstat

  • ipconfig /all

  • ipconfig /renew

Explicação

Questão 2 de 45

1

You want to perform a network installation of WIndows. Which of the following must be supported by the client computer?

Selecione uma das seguintes:

  • PCIe

  • PXE

  • BitLocker

  • Multiboot

Explicação

Questão 3 de 45

1

Which command is used to list the contents of a directory in the Command Prompt?

Selecione uma das seguintes:

  • cd

  • dir

  • ping

  • ver

Explicação

Questão 4 de 45

1

One of your customers runs WIndows on a laptop. A new security flaw and fix has been published regarding Windows. Which of the following can prevent exploitation?

Selecione uma das seguintes:

  • Encrypting the hard drive

  • Training the customer

  • Implementing a patching policy

  • Configuring screen locks

Explicação

Questão 5 de 45

1

Your company has multiple users who work with the same commercial software. What is the best type of license to purchase so that it is in compliance with the EULA?

Selecione uma das seguintes:

  • Seat license

  • Commercial license

  • Enterprise license

  • Open source license

Explicação

Questão 6 de 45

1

Which of the following is a risk of implementing BYOD?

Selecione uma das seguintes:

  • Encryption mismatches

  • Higher risk of phishing attacks

  • Introduction of malware onto the network

  • DHCP failures

Explicação

Questão 7 de 45

1

One of your co-workers tells you that whenever she returns to her desk she has to type her username and password to unlock the computer. She says she cannot modify the screensaver. After analyzing the system, you notice that the screensaver and the screen lock options are indeed grayed out. Which of the following is most likely the reason for this?

Selecione uma das seguintes:

  • Incorrect local-level user policies

  • Domain-level group policies

  • Antivirus domain-level policies

  • Corrupted registry

Explicação

Questão 8 de 45

1

Which of the following features in Windows allows the following command to run? (Select the two best answers.)

$PSVersionTable

Selecione uma ou mais das seguintes:

  • Compatibility mode

  • OneDrive

  • Windows Firewall

  • PowerShell

  • ISE

Explicação

Questão 9 de 45

1

You have been tasked with printing a group policy configuration report to an HTML file for offline review. Which of the following commands will enable you to do this?

Selecione uma das seguintes:

  • gpresult

  • gpupdate

  • gpedit.msc

  • secpol.msc

Explicação

Questão 10 de 45

1

Which of the following tasks is automatically added to the Windows Task Scheduler to improve hard disk performance?

Selecione uma das seguintes:

  • cleanmgr

  • defrag

  • diskpart

  • chkdsk

Explicação

Questão 11 de 45

1

Which of the following is the maximum addressable RAM limit for a system running a 32-bit version of Windows?

Selecione uma das seguintes:

  • No limit

  • 4 GB

  • 8 GB

  • 32 GB

  • 256 TB

Explicação

Questão 12 de 45

1

One of the users in your company frequently leaves her workstation and wants to make sure that her confidential data is not accessed by someone else. However, the user does not want to turn off the computer when she leaves work in the evening. Which of the following is the best solution for securing the workstation?

Selecione uma das seguintes:

  • Implement a password and fingerprint lock for after-hours login

  • Set a strong password that requires a renewal every 30 days

  • Apply a screen lock after 5 minutes of nonuse and set login time restrictions after hours

  • Run a screensaver after 1 minute of nonuse and a fingerprint lock for after-hours

Explicação

Questão 13 de 45

1

A manager suspects that a user has obtained movies and other copyright-protected materials through the use of a BitTorrent client. The incident response tech confirms the suspicion, and as such, the user is in violation of the company policy. What should the incident response technician do next?

Selecione uma das seguintes:

  • Immediately delete all unauthorized materials

  • Secure the workstation in a limited-access storage facility

  • Reprimand the user and apply a content filter to the user's profile

  • Document the incident and purge all policy-violating materials

Explicação

Questão 14 de 45

1

A new user in your company has been given permission to connect to the corporate network with a smartphone that he owns. Which of the following should you perform before configuring the smartphone that he owns. Which of the following should you perform before configuring the smartphone for actual access to the network?

Selecione uma das seguintes:

  • Check the phone for authorized access

  • Erase all personal data from the phone

  • Check the phone for location tracking

  • Disable Bluetooth

Explicação

Questão 15 de 45

1

You work for an organization that uses various permissions for individual user accounts. One of the managers with a restricted user account receives the following message:
Windows Update cannot currently check for updates because the service is not running.
The manager contacts your organization's help desk to report the error. You connect to the manager's computer and identify the problem. What action should you take next to quickly resolve the problem?

Selecione uma das seguintes:

  • Reboot the computer

  • Roll back the device drivers

  • Restart the network services

  • Rebuild the Windows profile

Explicação

Questão 16 de 45

1

Which of the following usually incorporates an eight-digit code that can be found on the bottom of a SOHO router?

Selecione uma das seguintes:

  • Port forwarding

  • WPS

  • Wireless encryption

  • Port triggering

Explicação

Questão 17 de 45

1

You have been asked to set up a new networking closet and you notice that the humidity level in the room is very low. Which of the following tasks should be done before rack-mounting and networking equipment?

Selecione uma das seguintes:

  • Install grounding bars

  • Set up a dehumidifier

  • Use an ESD strap

  • Implement a fire suppression system

Explicação

Questão 18 de 45

1

Which of the following security techniques is most closely related to when a user enters a username and password once for multiple applications?

Selecione uma das seguintes:

  • Propagation

  • MFA

  • SSO

  • Inheritance

Explicação

Questão 19 de 45

1

Jason from accounting reports that when pressing Ctrl_Alt_Del to log on to a Windows workstation, he is asked for a PIN. Which of the following should you tell Jason?

Selecione uma das seguintes:

  • "Enter all the passwords that you have used previously"

  • "Reboot the computer"

  • "Check the network cable"

  • "Please verify that you are using your smart card"

Explicação

Questão 20 de 45

1

A surge suppressor safeguards connected equipment by directing surges to the...

Selecione uma das seguintes:

  • Path of least resistance

  • path of shortest conductance

  • path of lowest inductance

  • path of highest voltage

Explicação

Questão 21 de 45

1

By default, a file or folder will receive its NTFS permissions from the parent folder. This process is known as which of the following terms?

Selecione uma das seguintes:

  • Permission propagation

  • Single sign-on (SSO)

  • Client-side virtualization

  • Proxy settings

  • Recovery image

  • Inheritance

Explicação

Questão 22 de 45

1

Which of the following are example of physical security? (Select the two best answers.)

Selecione uma ou mais das seguintes:

  • Directory permissions

  • OTP hardware tokens

  • Principle of lease privilege

  • Privacy filters

Explicação

Questão 23 de 45

1

You have been given technical documentation from the network administrator which details the switch ports that you will need to use for an upcoming network upgrade. Which of the following documents did you receive?

Selecione uma das seguintes:

  • Logical topology diagram

  • Process diagram

  • Physical network diagram

  • Fiber backbone diagram

Explicação

Questão 24 de 45

1

Which of the following will help to protect an organization from further data exposure after a list of passwords has already been leaked due to a policy breach? (Select two best answers)

Selecione uma ou mais das seguintes:

  • Require strong passwords

  • Use multifactor authentication

  • Educate end users

  • Enable file encryption

  • Restrict user permissions

Explicação

Questão 25 de 45

1

A user is reporting that his web browser is not going to the site he is trying to access. Which of the following statements describes the best way to resolve this?

Selecione uma das seguintes:

  • Ensure the user is not utilizing a proxy server

  • Remove all internet shortcuts

  • Delete all internet cookies

  • Clear all internet cache

Explicação

Questão 26 de 45

1

Which of the following Windows features has undergone the most significant changes from Windows 7 to Windows 10 and has also greatly simplified the OS installation process?

Selecione uma das seguintes:

  • Metro interface

  • User Account Control

  • Driver detection

  • PXE installation

Explicação

Questão 27 de 45

1

Which of the following terms best describes the Apple utility used with iOS devices for synchronizing and upgrading?

Selecione uma das seguintes:

  • Safari

  • iMac

  • iTunes

  • Bluetooth

Explicação

Questão 28 de 45

1

Which of the following is a way to remove data from a hard drive through destruction? (Select the two best answers)

Selecione uma ou mais das seguintes:

  • Disabling ports

  • Shredding

  • Drilling

  • Using low-level formatting

  • Purging

Explicação

Questão 29 de 45

1

Which of the following Internet Options tabs should you access to enable TLS 1.2 in Internet Explorer?

Selecione uma das seguintes:

  • Security

  • Privacy

  • Advanced

  • Connections

Explicação

Questão 30 de 45

1

You are attempting to install a Windows 10 64-bit OS within a VM but you keep receiving errors. The specifications for the VM include...

Selecione uma das seguintes:

  • Two 1-GHz CPUs

  • 2 GB of RAM

  • 15 GB hard drive space

  • 800 x 600 screen

Explicação

Questão 31 de 45

1

Your organization's network consists of 25 computers. Your boss is interested in employing a file server with network shares and a print server. Which of the following Windows network setups should you recommend?

Selecione uma das seguintes:

  • Workgroup

  • Ad hoc

  • Star

  • Domain

Explicação

Questão 32 de 45

1

Which of the following is the best example of the use of chain of custody?

Selecione uma das seguintes:

  • The technician notes the date, time, and who was given the computer.

  • The technician remembers when and who they gave the computer to.

  • The technician uses a third party to hand over the computer to the proper authorities.

  • The technician calls the supervisor after the computer has been transferred.

Explicação

Questão 33 de 45

1

You just installted a new updated driver for a network interface card (NIC). Now you want to test its data transfer rate. What tool should you use to run your test?

Selecione uma das seguintes:

  • Device Manager

  • Local Security Policy

  • Performance Monitor

  • Component Services

Explicação

Questão 34 de 45

1

You just got your first IT job working at a help desk. You get a cal from a user about an issue you have never seen before, and you are not sure where to begin troubleshooting. What is the first course of action you should take?

Selecione uma das seguintes:

  • Tell the customer that this is the first time you have encountered this problem and to please be patient.

  • Tell the customer that the problem needs to be escalated to a higher-tier technician.

  • Tell the customer to please hold while a senior technician is consulted regarding the problem.

  • Ask the customer if they would mind holding for no more than two minutes to check resources.

Explicação

Questão 35 de 45

1

One of your company's users just purchased an Android smartphone and is attempting to access a public hotspot. The user receives a message that a page cannot be displayed. The user notices a question mark in the radio icon in the toolbar. The user has activated Bluetooth and verified that airplane mode is off. Tethering is turned on. The user is using the smartphone to call in to the help desk for assistance. Which of the following is the most likely issue?

Selecione uma das seguintes:

  • The user has exceeded the data allowance

  • There is unauthenticated wireless connectivity

  • It is an un-rooted smartphone

  • The SIM card is not activated

  • The smartphone is only 3G capable

  • A data plan was not purchased

Explicação

Questão 36 de 45

1

Which Windows utility can be used to see which user is currently logged on?

Selecione uma das seguintes:

  • MSConfig

  • Disk Management

  • Task Manager

  • Administrative Tools

Explicação

Questão 37 de 45

1

Which of the following tools are commonly used to remove dust from the inside of a computer? (Select the two best answers.)

Selecione uma ou mais das seguintes:

  • Compressed Air

  • Cotton and alcohol

  • Feather duster

  • Antibacterial surface cleaner

  • Vacuum

Explicação

Questão 38 de 45

1

You have been tasked with installing Windows 10 on 100 comuter to a new subnet on your network. You are required to remove system-specific identifiers. Which of the following should be used to accomplish this?

Selecione uma das seguintes:

  • System Preparation tool

  • Windows Deployment Services

  • Remote Installation Services

  • Unattended installation

Explicação

Questão 39 de 45

1

Which of the following is a common symptom of a problem that can occur while starting up the Windows operating system?

Selecione uma das seguintes:

  • Spontaneous shutdown/restart

  • Invalid boot disk

  • WinRE won't start

  • The optical disc failed

  • The emergency repair disk doesn't boot

  • Regsvr32 has failed

Explicação

Questão 40 de 45

1

Which of the following are possible symptoms of malware? (Selet all that apply.)

Selecione uma ou mais das seguintes:

  • Security alerts

  • Windows Update failures

  • Pre-installation environment

  • Renamed system files

  • Rogue antivirus

  • User error

Explicação

Questão 41 de 45

1

One of your company's users complains that his smartphone is making shutter noises even when he is not taking pictures. What should you do first to determine the cause of the problem?

Selecione uma das seguintes:

  • Update all applications on the smartphone

  • Run OS updates

  • UNinstall the camera installation

  • Check the application permissons

  • Reset the phone to factory settings

Explicação

Questão 42 de 45

1

You are troubleshooting a Windows system suffering from poor performance. The Event Viewer states that the file system is corrupt. What should you do next?

Selecione uma das seguintes:

  • Reload the OS using FAT32 instead of NTFS

  • Run chkdsk with the /R option and reboot the system

  • Open the defrag utility and run the drive analysis

  • Change the drive from basic to dynamic

Explicação

Questão 43 de 45

1

Which type of fire extinguishing technolgy should be used during an electrical fire?

Selecione uma das seguintes:

  • Overhead sprinkler systems

  • Water-based fire extinguishers

  • Class B fire extinguishers

  • Non-water-based fire extinguishers

Explicação

Questão 44 de 45

1

You attempt to install a legacy application on a computer running Windows 8. You receive an error that says the application cannot be installed because the OS is not supported. Which of the followin describes the first step you should take to continue installing the application?

Selecione uma das seguintes:

  • Install the latest service pack

  • Install the application in Safe Mode

  • Install the application in compatibility mode

  • Install the latest security updates

Explicação

Questão 45 de 45

1

You have been tasked with setting up a SOHO wireless network in a small healthcare office that cannot afford a server. The wireless users require the highest level of security available, and various other levels of desktop authentication for access to cloud-based resources. Which of the following protocols and authentication methods should you implement? (Select the two best answers.)

Selecione uma ou mais das seguintes:

  • WEP

  • WPA

  • WPA2

  • TKIP

  • RADIUS

  • TACACS+

  • SSO

  • Multifactor

Explicação