Deck #013 Flashcards Preview

A+ 220-100X Alpha > Deck #013 > Flashcards

Flashcards in Deck #013 Deck (25)
Loading flashcards...
1
Q

A technician is installing the latest OS on a users system. The user wants all of the settings and file to remain intact during the installation.
Which of the following upgrade methods should the technician use?

A. network installation
B. clean install
C. in-place upgrade
D. image deployment

A

Correct Answer: C

2
Q

A team needs to deploy a temporary server room at a site to provide support during construction.
Which of the following should they use at this site while setting up the server room?

A. Air filters
B. Privacy screens
C. Vacuums
D. ESD mats

A

Correct Answer: A

3
Q

A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring.
Which of the following would BEST accomplish this goal?

A. Use an antivirus product capable of performing heuristic analysis
B. Use a host-based intrusion detection system on each computer
C. Disallow the password caching of accounts in the administrators group
D. Install a UTM in between PC endpoints to monitor for suspicious traffic
E. Log all failed login attempts to the PCs and report them to a central server

A

Correct Answer: A

4
Q

Which of the following technologies is used by malicious employees to obtain user passwords?

A. Main-in-the-middle
B. Phishing
C. Tailgating
D. Shoulder surfing

A

Correct Answer: D

5
Q

A technician is recycling PCs to be reused by a middle school.
Which of the following methods is MOST appropriate for ensuring data has been removed from the PCs?

A. Standard formatting
B. HD drilling
C. Low-level formatting
D. HD partitioning

A

Correct Answer: C

6
Q

A user reports that when opening a web browser, the initial page loads to a search engine the user does not recognize. When the user performs searches on the site, the results are often irrelevant, and there are many pop-ups. Which of the following should a
technician do to resolve these issues? (Choose two.)

A. Reset the users browser to default settings
B. Delete the users cached images, temporary files, and cookies
C. Reboot the users computer and install a secondary antivirus
D. Convince the user to use a different web browser that is currently unaffected
E. Download the update to the users web browser of choice
F. Remove any unapproved applications from the users startup items

A

Correct Answer: AF

7
Q

A technician is in the process of upgrading Windows 8 to Windows 10. The technician needs to make sure all of the applications, user profiles, documents, and PST files are preserved. Which of the following methods would the technician MOST likely perform on
the computer?

A. Unattended installation
B. Refresh upgrade
C. Clean installation
D. In-place upgrade

A

Correct Answer: B

8
Q

Which of the following is the MOST secure wireless security protocol?

A. AES
B. WPA
C. WPA2
D. WEP

A

Correct Answer: A

9
Q

Joe, a customer, calls a technician to report a remote computer is demonstrating erratic behavior while he is working on it. The technician verifies the files and directories. Joe is working on locally cannot be opened in any application, and the computer is running
extremely slow. Which of the following is the MOST likely cause of this issue?

A. Files disappearing
B. File permission changes
C. Application crash
D. Too many startup items

A

Correct Answer: D

10
Q

Corporate management is concerned about the security of the companys mobile phones, in the event they are lost or stolen. Management instructs the IT staff to ensure the data on the devices is not accessible by unauthorized users. Which of the following
would provide the BEST level of protection in this scenario? (Choose two.)

A. Use full device encryption
B. Enable a pattern lock
C. Implement remote wipe features
D. Use device lockout policies
E. Require complex administrator passwords
F. Disable unknown application installations

A

Correct Answer: AC

11
Q

A technician repaired a laptop for a customer. The customer then complained the repair took too long and questioned the steps the technician took to fix the problem. Which of the following should the technician do NEXT?

A. Provide documentation of the repair to the customer
B. Allow the customer to voice concerns and post the story to social media later
C. Inform the customer the job is done and return to the office
D. Defend each step and why it was necessary

A

Correct Answer: A

12
Q

A user is attempting to install an application and receives an error stating there is not enough space to install the application. Which of the following did the user overlook?

A. Installation method
B. System requirements
C. OS compatibility
D. File permissions

A

Correct Answer: B

13
Q

Ann, an end user, is working with highly regulated data and often notices the high volume of traffic in her work area. Ann requests help with limiting the exposure of data as people walk by.
Which of the following security measures should be used?

A. Biometric device
B. Common access card
C. Cable lock
D. Privacy screen
E. Mantrap
A

Correct Answer: D

14
Q

A SOHO technician needs to upgrade two computers quickly and is not concerned about retaining user settings. The users currently have Windows 8 and want to upgrade to Windows 10.
Which of the following installation methods would the technician MOST likely use to accomplish this quickly?

A. Unattended installation
B. Remote network installation
C. In-place upgrade
D. Clean installation

A

Correct Answer: A

15
Q

A technician received 300 old desktops following a recent computer upgrade. After taking inventory of the old machines, the technician must destroy the data on the HDDs. Which of the following would be the MOST effective method to accomplish this task?

A. Drill
B. Hammer
C. Low-level format
D. Degaussing

A

Correct Answer: D

16
Q

A user reports malware activity on an isolated workstation used for testing. It is running an end-of-life OS, and a USB drive is the only method used to transfer files. After removing the malware and replacing the USB drive with a brand new one, the technician
gives the approval to use the equipment. The next day the user reports the same malware activity is present after powering on the system. Which of the following did the technician forget to do to prevent reinfection?

A. Connect to the network and update the OS with the latest security patches
B. Scan and clean the USB device used to transfer data from the equipment
C. Disable System restore and remove all restore points from the system
D. Update the local antivirus and set it to scan automatically every evening

A

Correct Answer: D

17
Q

A corporate network was recently infected by a malicious application on a flash drive that downloaded sensitive company files and injected a virus, which spread onto the network. Which of the following best practices could have prevented the attack?

A. Implementing strong passwords
B. Changing default credentials
C. Disabling AutoRun
D. Removing Guest account
E. Encrypting data
A

Correct Answer: C

18
Q

Which of the following technologies can be utilized in a wireless network environment to provide secure SSO access for WiFi and network resources?

A. WPA2
B. AES
C. MAC filtering
D. RADIUS
E. WPS
A

Correct Answer: D

19
Q

A technician has installed a second monitor for a customer, but the desktop font sizes do not match. Which of the following display settings should be technician adjust to correct this issue?

A. Resolution
B. Refresh rate
C. Extended monitor
D. Color depth

A

Correct Answer: A

20
Q

Which of the following built-in accounts was removed in Windows 10?

A. Power User
B. Administrator
C. Guest
D. Standard User

A

Correct Answer: A

21
Q

A technician recently installed a new secondary hard drive in a Windows 10 desktop. After the installation, the computer displayed the following error message: No Operating System Found. However, after unplugging the new hard drive, the error message
no longer appeared. The technician then reconnected the new drive to continue troubleshooting. Which of the following steps should the technician take NEXT?

A. Reboot into safe mode
B. Check the boot order
C. Format the drive
D. Perform Windows Recovery
E. Run the chkdsk command
A

Correct Answer: B

22
Q

Joe, a user who is travelling for business, reports that his mobile phone was getting approximately 35 Mbps for the first few days of his trip, but now it is only getting around 500 Kbps. Joe uses the device as a GPS to visit customers and as a hotspot to check work
email and watch movies online. Which of the following is the MOST likely cause of Joes slow data speeds?

A. Joes data transmission is over the limit
B. The phone needs to be rebooted from overuse
C. The use of GPS interferes with data speeds
D. There is unintended Bluetooth pairing

A

Correct Answer: A

23
Q

After a security audit, a technician is tasked with implementing new measures to help secure company workstations. The new policy states that all workstations must be signed off at night, a password is necessary to boot the computer, and encryption must be
enabled. Which of the following features should the technician implement to BEST meet these requirements? (Choose three.)

A. Screen locks
B. Screensaver passwords
C. UEFI passwords
D. Login time restrictions
E. Strong passwords
F. Multifactor authentication
G. BitLocker
H. Credential Manager
I. Smart card
J. Biometric authentication
A

Correct Answer: ABG

24
Q

A new business will be using credit cards in a physical location as well as its web presence. Which of the following does the business need?

A. PHI certification
B. PCI compliance
C. POTS implementation
D. PII filtering

A

Correct Answer: B

25
Q

A technician has been dispatched to resolve a malware problem on a users workstation. The antivirus program discovered several hundred potential malware items on the workstation and removed them successfully. The technician decides to schedule daily
scans on the system, enables System Restore, and creates a restore point. Which of the following should the technician do NEXT?

A. Run the scan again to ensure all malware has been removed
B. Quarantine the infected workstation from the network
C. Install all of the latest Windows Updates to patch the system
D. Educate the user on safe browsing practices

A

Correct Answer: C