0% found this document useful (0 votes)
22 views8 pages

A+ Core 2 Study Guide

The document contains a series of questions and answers related to IT concepts, troubleshooting, and security measures. It covers topics such as malware types, network protocols, system commands, and best practices for managing computer systems. The information is structured as a quiz format, providing a quick reference for IT professionals.

Uploaded by

ryandriskill
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views8 pages

A+ Core 2 Study Guide

The document contains a series of questions and answers related to IT concepts, troubleshooting, and security measures. It covers topics such as malware types, network protocols, system commands, and best practices for managing computer systems. The information is structured as a quiz format, providing a quick reference for IT professionals.

Uploaded by

ryandriskill
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

1. Which of these is not generally attributed to an intermittent wireless issue?

Wireless
access points
2. You need to change a computer’s name and join it to a domain. Which of the following
will allow you to perform these actions? System properties
3. Which of the following types of malware silently tracks and records all user input to
gather information about the user and sends it to other parties? Keylogger
4. Stacy, a sys admin, is working on a computer system when a voltage drop in power
occurs that last for around 45 minutes. What type of power supply problem has
occurred? Brownout
5. You are having trouble connecting to a server and want to make sure you are receiving
the correct IP address from DNS. Which command do you use? Nslookup
6. Which of these is the legal control of a licensor and a purchaser to govern and establish
the purchaser’s right to use the software? Eula
7. Which of these is used to examine the potential impact of the change and evaluate the
possible outcomes in the change management process? Risk analysis
8. Which of these is not the common culprit of random reboots? Storage health
9. Which network protocol and port does RDP operate on? TCP port 3389
10. When is winresume.exe called if a system is not starting fresh but resuming a previous
session? Bootmgr
11. What happens when RAM fills up? The mobile device will swap background memory
pages onto the built-in storage.
12. What happens when the users initialize a disk in Windows? They are allowing LDM to
recognize the disk.
13. Which of these measures electrical current, voltage, and resistance? Multimeter
14. Which of the following macOS tools creates an incremental backup of files that can be
restored at a later date? Time machine
15. David, an IT tech, is allowed to use his personal computer and mobile device freely for
work as the organization feels that this saves money and increases the morale of the
employees. What kind of policy is being followed? BYOD
16. Which of these oversees every process in the organization and can answer questions
about the process? Responsible staff member
17. Which of these is a multitasking method that depends on the application itself to be
responsible for using the processor and then freeing it for access by other applications?
Cooperative multitasking g
18. How do the users use an ESD antistatic strap? By attaching one end to the case and
wrapping the other end around the wrist.
19. A tech is configuring a new Windows computer for a home office. Which of the following
steps should the tech take to secure the workstation? Rename default accounts
20. Ansel, a tech, is using Windows 8 and wants to display the list of files and folders within
a directory. Which of the following commands will he use to complete this task? Dir
21. Which of these is a particularly intrusive sort of malware that attempts to extort money
from the victim in order to undo or prevent further damage? Ransomware
22. Which tab in task manager allows you to see processes separated by each customer on
the system? Users
23. Which of the following tools is used to filter air, remove debris and return fresh air to a
confined space? Enclosures
24. Which of these will accomplish a specific task for the user? Application
25. When you search for a product and click the link in the results, the malware will redirect
your browser to the intended site with an associated link attached. Now anything you
purchase will credit a commission to the person who redirected the browser with the
associated link. Which of these is being explained? Affiliate redirection
26. When is sandbox testing extremely useful? When the users want to test a change before
placing it into production
27. What is primarily used to segregate network traffic, optimize network speed, and
permanently assign a network path for a specific protocol or network service? Port
forwarding
28. In which of the following macOS X versions was the Dark mode introduced? 10.14
Mojave
29. Which of these writes zeros to the entire drive and restores the drive to its newly
installed configuration? Low level format
30. Which of these is commonly used to refer to the operating systems intended to run on
the intel processor? X86
31. Which of the following statements is true about Windows 10 Pro for workstations? It is
preinstalled on high-end hardware for HPC requirements and allows up to 4 CPUs and
6TB of RAM
32. Which of the following Windows features provides a scripting language ability that can
be used by the users for task automation? Power shell
33. Which of the following authentication systems is used as the authentication back end for
WiFi networks that are using the WPA enterprise security? RADIUS
34. Which of these are embedded RFID circuits that fit on a set of keys and are used with
physical access control system? Key fob
35. Which of these is a method to alert security personnel in the event of unauthorized
access or a break-in? Alarm system
36. Which of these shows the location of the print drivers? print$
37. When is the repair installation used? When the users want to reinstall the operating
system without losing the personal data files, application settings, or applications that the
users have installed
38. A desktop alert is a notification or dialog box that is crafted to look like it was generated
by the operating system.
39. Which of these is the legal contract between a licenser and a purchaser to govern and
establish the purchaser’s right to use the software? EULA
40. Which of the following OS is the second draft of an operating system? Beta
41. What is the first step that the users should take after they have isolated the problem to
an action or process in the operating system? Formulate a theory or probable cause
42. Which of the following partition table formats can be used with disks of any size and
allows an almost unlimited number of partitions? GPT
43. What type of malware is able to conceal itself from many parts of the OS and will
obtain/retain elevated privileges? Rootkit
44. You have a laptop that has no CD-ROM drive. In which of the following ways could you
install windows 10? Usb and PXE
45. Which of the following command line utilities starts a command prompt in Windows?
Cmd.exe
46. In which of the following attacks does an attacker intercept and relay communications
between 2 points and impersonate each party in the eyes of the other? Man in the
middle
47. You need to blow dust or other particles out of hard to reach areas in the computer.
Which tool will you use? Compressed air
48. What is the page file called in windows? Pagefile.sys
49. You are having trouble connecting to a server and want to make sure you are receiving
the correct IP address from DNS. Which command should you use? Nslookup
50. You need to protect files on the desktop operating system with encryption but found out
you do not have TPM. What can you use to protect the files? Encrypted file system
51. Which of these is designed to centrally administer devices in order to assign device
permissions, verify security compliance, apply updates, and even monitor activity? MDM
52. Which filesystem performs on-the-fly defragmentation? Ext4
53. What is the goal of the change advisory board? To evaluate the proposed changes in
order to reduce the impact on the day-to-day operations
54. What is the publisher of the key pair called? Certificate authority
55. Which of these includes safety and health information about chemical products,
including health risks and storage, disposal recommendations, and procedures for
containing a leak or spill? Material safety data sheets
56. Which of these is a safety risk from overheating a lithium ion battery? Explosion
57. Which of the following passwords is valid for only a single use and cannot be reused?
OTP
58. Which file system allows encryption of individual drives and folders on an NTFS volume?
EFS
59. Which user group exists on windows but has no special privileges and can be
customized to make a general set of privileged user permissions? Power users
60. Which of these is a US federal law designed to prevent fraudulent accounting practices?
SOX
61. What is a symptom of the operating system running out of RAM? High disk activity
62. What statement about the USB controller is true? It is a hardware component on the
motherboard that supplies both the power and the data path for the connect devices
63. Which is the correct way to create a restore point? Windows creates them automatically
by default
64. What type of software licensing agreement provides a free trial software, with the
expectation that the users will pay for it if they decide to keep it? Shareware
65. The RTC on the motherboard is responsible for maintaining the correct time.
66. Which of the following guidelines should be followed for account management in a
Windows 7 computer? Change default usernames, set time restrictions, restrict user
permissions
67. Which utility shows a log of application and system messages, including errors,
information messages, and warnings? Event viewer
68. Which cipher is used by the WPA encryption standard to encrypt network traffic? TKIP
69. Which of the following gpupdates tool options reapplies all policies, even those which
haven’t been changed? /force
70. Which of the following is true about a magnetometer? It uses an electromagnetic field to
detect metallic objects
71. A type of security threat that executes the command received from another computer
into your computer is known as a botnet.
72. Synchronization can copy all contacts, programs, email messages, pictures, music, and
videos between a mobile device and a computer.
73. Steps to securely overwrite an entire hard drive: perform a full format that rewrites an
entire drive, perform a low level format that writes zeroes to the entire drive and restores
the data to its newly installed configuration, implement data destruction utilities such as
DBAN, HDshredder, and KillDisk
74. By using the 5GHz wireless band, you can limit the amount of interference from external
devices.
75. If Windows is returning from a hibernated state, winresume.exe is responsible for
reading the hiberfil.sys file into memory and passing control to the kernel after the file is
loaded.
76. The line REM comment is used on Windows batch script code.
77. The diskpart command allows the users to view the volume size via the command line.
78. The magnetometer, also known as a metal detector, uses an electromagnetic field to
detect metallic objects.
79. The modify permission on a folder allows a user to read, write, and delete the files in the
folder.
80. You want to enhance the security of an organization by providing hardware-based
cryptographic processing and secure key storage for full-disk encryption. You want to
use TPM to achieve this task.
81. After you have quarantined your infected system, what should be your next step?
Disable system restore in Windows
82. In the brute-force method, an attacker tries every possible password or key in a
methodical order until the attacker finds the right password or key.
83. The netstat command allows the users to view the listening and established network
connections for the operating system.
84. Universal Windows Platform UWP is a development platform that allows for the
development of applications across the various Windows 10 platforms.
85. EFI (extensible firmware interface) system partition is a system partition used to hold
BCD (boot configuration data) for the booting of the boot partition containing the
Windows kernel.
86. Credential manager is a control panel utility that allows individual users to access their
stored user names, passwords, and certificates.
87. Which of the following is not a common culprit of random reboots? Battery life
88. Which of the following Linux command terminates a process? Kill
89. You will choose the snapshot feature to save the state of a system at a particular point in
time.
90. The knowledge base is a collection of articles that serves as the first line of customer
support, helping the customers to educate themselves about the products and services
and ideally solve their own problems before calling the help desk
91. The .ipa file extension is for iOS app store package files, and it is therefore associated
with iOS
92. Telnet and SSH are application layer protocols that can be used for providing remote
access and managing a device.
93. The tracert command helps in verifying the route to a remote host.
94. Which of these can be used as the main authentication method for the Microsoft
implementation of a RADIUS server called NPS? Kerberos
95. The SSO (single sign-on) authentication allows a user to sign in once to any one of the
groups of mutually trusting services, then seamlessly switch between services without
being prompted for credentials again.
96. HIPAA affects healthcare providers and providers that support health records.
97. The command dir will display a list of files and folders/sub-folders within a directory.
98. The antivirus engine is responsible for the real-time scanning of operating system files
and the notifications to the user.
99. What is the normal distance required by NFC to operate? 4 cm
100. The auto rotate function allows a phone to switch between portrait mode and
landscape.
101. GLBA affects providers of financial services.
102. The sudo command allows users to run programs with the security privileges of
the root user.
103. Which of these can be a process running in RAM that requires a memory dump
for further analysis? Memory contents
104. What command lets you verify network connectivity for a host? Ping
105. Use ifconfig on a Linux based system to determine if the network interface is
working properly.
106. You should use UPS (uninterruptible power supply) which is a battery backup
that instantly takes over during blackouts or brownouts.
107. You want to shrink the partition size of a hard drive. Which of the following is the
best choice to modify the size of the partition? Computer management
108. You have to create a physical diagram of your company’s network. On which of
the following components will you focus? Port, cable, host
109. Application spoofing is the act of a malicious application spoofing a legitimate
application.
110. You’ve upgraded four computers and would like to securely repurpose the hard
drives for later use. Which of these will you do to accomplish the task? Drive wipe
111. What security measures can you take to secure your wireless network after
you’ve enabled encryption? Change default SSID, scan periodically for rogue access
points
112. Which of the following is the best way to disposed of toner cartridges? Send
them to the manufacturer
113. A PC tech deploys printers on a company’s network via a new group policy.
However, the printers are not showing on the workstations. Which of the following
commands should the tech use? Gpupdate
114. Which of the following logs can be viewed using the event viewer tool on
Windows computers? System log, application log, security log
115. You will use the MSTSC utility to troubleshoot the problem without visiting the
user’s location.
116. Which type of account will have limited access to individuals without an account?
Guest
117. A user asks a tech to help find the system errors arising at the time of start-up of
his Windows 11 PC. Which of the following utilities do you tell the user? Event viewer
118. Which Windows Update branch allows the users to install preview releases of
update for Windows 10? Insider program
119. The facial recognition system is a technology capable of identifying or verifying a
person from a digital image or a video frame.
120. Spoofing is a technique that falsifies the origin of network communications, either
to redirect responses or to trick users into thinking that it comes from a trustworthy
source.
121. The accessibility preference allows the users to customize macOS to support
requirements such as vision, hearing, or motor skills.
122. Spear phishing is an email spoofing attack that targets a specific organization or
individual seeking unauthorized access to sensitive information.
123. Moving USB devices around on the USB port is the first step in remediating USB
issues related to resources
124. The chkdsk tool is used to check the disk and repair any bad clusters, if
possible.
125. A cryptominer is a purpose built device that grinds out cryptographic
computations.
126. An evil twin attack involves two access points; one is operated by an organization
and the other is operated by the threat agent.
127. Which of these is most likely the reason for running the disk defragmenter utility
on a Windows 8.1 computer? To improve the read performance of a hard disk drive.
128. How can users access files on a CD or DVD installed on one remote machine in
macOS? By using remote disc
129. Which RAID system requires three or more disks to provide fault tolerance?
Striping with parity
130. The chown command is used to change the owner and the group with which a
file or folder is associated.
131. The msconfig command opens the system configuration utility dialog box which
can be used to troubleshoot and resolve startup errors, resolve unwanted prompts by
3rd party users, find and resolve problems with running services, and resolve the errors
regarding boot paths configured on multi-boot computers.
132. GDPR (general data protection regulation) is a newly enacted EU regulation that
protects the privacy of individual data related to EU residents.
133. The cd .. command moves the users up one directory.
134. When developing android applications, the developer with side-load the
application, usually using an android tool such as ADB.
135. A trojan horse is a program that enters a system or network under the guise of
another program.
136. Which macOS feature is similar to Windows File Explorer? Finder
137. The netstat -nab command enables the users to view all the processes on the
operating system and their network connections.
138. Windows Defender is a protection program provided by Microsoft to protect
computers running windows from spyware and malware.
139. Which of these is a network protocol that allows for automatic configuration of
port forwarding? UPnP
140. Which command should you run to make the System File Checker automatically
repair your system files? Sfc /scannow
141. To properly remove malware from an infected computer, you should perform the
following steps:

142. Here are the physical controls you should use for the physical security of your
organization: hire security guards to authenticate users or monitor for intrusion, use
CCTV or IP based security cameras, use mantraps that allow only one person to pass a
time
143. The rem command will allow you to add comments in a batch (.bat) file that runs
in the Windows Command Prompt environment
144. You are asked to write a script in the python language. Which of the following
script formats will you use for this? .py
145. Which of these will allow the developer to install APK directly onto the device
they are testing with? ADB - android debug bridge
146. EFI system partition is a system partition used to hold BCD for the booting of the
boot partition containing the Windows kernel.
147. You work as a network administrator in a company. A user has brought to your
attention that some malicious-looking icons have on his PC. You’ve quarantined the
infected system. Which of the following steps will you take next? Disable system restore
148.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy