CompTIA A+ 220-1001 & 220-1002 ITProTV - A+ 1002 Practice
This flashcard set is based on the ITProTV A+ 220-1002 practice content, focusing on security best practices like the Principle of Least Privilege. It reinforces how to properly manage user permissions and minimize security risks in real-world environments.
What is the best Implementation of the Principle of Least Privilege?
What is the best Implementation of the Principle of Least Privilege?
Issuing the Run As command to execute Administrative tasks during a regular user session.
Issuing a Single Account to each user, regardless of his job function
Completing Administrative tasks at a computer that functions only as a Server
Ensuring that all services use the main Administrative Account to execute their processes.
Issuing the Run As command to execute Administrative tasks during a regular user session.
Explanation:
The best implementation of the principle of least privilege is to issue the Run As command to execute administrative tasks during a regular user session. You should never use an Administrative Account to perform routine operations, such as creating a document, checking your email, or so on. Administrative Accounts should only be used when you need to perform an administrative task, such as configuring services or backing up a computer. The principle of least privilege is usually implemented by limiting the number of administrative accounts. Tools that are likely to be used by hackers should have permissions that are as restrictive as possible.
Key Terms
What is the best Implementation of the Principle of Least Privilege?
Issuing the Run As command to execute Administrative tasks during a regular user session.
Issuing a Single Account to each user, regardless of his job function
Completing Administrative tasks at a computer that functions only as a Server
Ensuring that all services use the main Administrative Account to execute their processes.
Issuing the Run As command to execute Administrative tasks during a regular user session.
Explanation:
The best i...
You run Systeminfo command on a Windows 7 Computer, what will NOT be displayed?
Domain Name
Virtual Memory Statistics
Installed Hotfixes
Boot Options
Boot Options
You need to access content on a CD or DVD drive when you do not have an Optical Drive in your Mac computer. Which feature should you use?
Finder
Boot Camp
iCloud
Remote Disk
Remote Disk
Explanation:
Remote Disk is the Feature of macOS to access content on a CD or DVD drive when you do n...
You decide to edit the boot order for your Windows 8 computer using the MSCONFIG utility. To which file is the Edit Saved?
Ntoskrnl.exe
bootmgr
boot.ini
BCD
BCD
Explanation:
BCD is a file that replaced the boot.ini File. Boot.ini was used in Windows XP and earlier, the ...
You organization is concerned with unauthorized users downloading confidential data to removable media. You decide to encrypt the confidential data using the Encrypting File System (EFS).
You need to copy an EFS-Encrypted File. The File will be copied to an NTFS volume that does not implement EFS. What is the state of the file?
The Original version of the file is decrypted. The new version is decrypted.
The Original version of the file remains encrypted. The new version is decrypted.
The Original version of the file remains encrypted. The new version is encrypted.
The Original version of the file is decrypted. The new version is encrypted.
The Original version of the file remains encrypted. The new version is decrypted.
You have a 3TB drive on which you want to install Windows. How must you format the drive to have the Operating System recognize the entire drive?
MBR
Extended
GPT
Basic
GPT
Explanation:
To Install Windows on a 3TB Drive, you must format the drive as a GUID Partition Table (GPT) to ...
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
Term | Definition |
---|---|
Issuing the Run As command to execute Administrative tasks during a regular user session. | Issuing the Run As command to execute Administrative tasks during a regular user session. Explanation: |
Domain Name | Boot Options |
Finder | Remote Disk Explanation: Boot Camp is a MAC feature that allows you to Install Windows on a MAC Computer. iCloud is a central internet storage that allows you to store your content and have it accessible on any of your MAC devices. Finder is the Filing System that you can use to organize your files on macOS. |
Ntoskrnl.exe | BCD Explanation: bootmgr.exe file is the Boot Loader file for Windows Vista and later. ntoskrnl.exe file is the Windows NT System Kernel, this file should NOT be edited. |
You need to copy an EFS-Encrypted File. The File will be copied to an NTFS volume that does not implement EFS. What is the state of the file? The Original version of the file is decrypted. The new version is decrypted. | The Original version of the file remains encrypted. The new version is decrypted. |
MBR | GPT Explanation: You cannot install Windows on an Extended Partition. Extended refers to Partitioning, NOT Formatting. Basic refers to Partitioning, not Formatting. Can be either Primary or Logical and reside on a Physical Drive. Basic Disk can have up to 4 Partitions. |
mv | dd Explanation: dd = Allows you to copy a File and Convert it to another format during the copying process. Used for Hard Drive Images in Linux. apt-get = Advanced Packaging Tool and Install Packages. cd = Changes Directory chmod = Changes Permissions on a File. chown = Changes the Ownership of a File. cp = Copies files and directories. grep = Finds a pattern of text within a file or group of files. iwconfig/ifconfig = Equal to ipconfig in Windows. ls = Lists file and directory contents. mv = renames or moves a file ps = provides a list of current processes running on a system pwd = Print Working Directory passwd = allows you to change the password of a user account q = quits the VI editor rm = removes a file shutdown = turns off the computer su/sudo = superuser root execute vi = text editor in Linux |
Enable BitLocker | Enable Offline Files Explanation: Sync Center basically syncs files with other devices on your network. BitLocker/BitLocker To Go is Encryption Technology. BitLocker To Go encrypts files on removable drives such as USB Flash Drives. Windows 7 Library are similar to Folders, but libraries do not actually store files. Library’s display files that are stored in several folders at the same time. Libraries allow a user to organize all related document, pictures, and other files so they appear to the user as a single location when they may be stored in separate locations. |
Use a bootable flash drive | Flash the BIOS Explanation: Boot Loader is the set of tests or programs that a computer goes through when it initializes and tests system hardware components after the POST is complete. Electrically Erasable Programmable Read Only Memory (EEPROM) chips are permanent chips that can be over-written or programmed with new info for the BIOS. The process to update these chips was much more difficult than just flashing the BIOS. |
The Android GPS needs a view of the sky. | The Android GPS requires the help of Cell Towers to obtain a location. |
Control Panel Category View > Clock, Language, and Region - Select Date and Time | Control Panel Category View > Date, Time, Language, Regional Options - Select Date and Time Options |
Windows 8 | Windows 8 |
Windows 10 | Windows 10 |
Which of the following is described as gaining unauthorized access to the data center by using another user’s credentials? piggybacking | piggybacking |
Your company has decided it wants to implement multi-factor authentication. What is the BEST implementation you should deploy? smart cards, usernames, and PIN | biometrics, smart cards, and strong passwords |
As a tech who frequently observes electrostatic discharge (ESD) damage to parts, you have become concerned about the presence of contributing factors in your work area. Which environmental condition is likely to cause ESD problems? low humidity | low humidity |
Aaron is using Microsoft Excel on his portable computer, and reports being unable to move the cursor from one cell to the other cell with the arrow keys. Aaron also confirms that he is able to use the mouse to move the cursor from one cell to the other cell. What is the reason for this cursor issue? Shift Key is Pressed | Scroll LK is On Explanation: Num LK does not control the scrolling feature. It’s used to switch between Number Entry and Arrow Keys. |
A user wants to be able to restore his system files on his Windows 7 computer to an earlier point in time. He asks that you ensure that a Restore Point is created every day at the same time. Which tool should you use to schedule the Restore Point creation? Volume Shadow Copy Service | Task Scheduler |
Management has requested that BitLocker To Go be implemented on all Windows 7 computers. Which hardware is required to implement this Technology? Network Interface Card | USB Flash Drive Explanation: |
You upgrade a device driver on your Windows 7 computer and reboot. After logging in, you notice that the device does not perform. How do you go back to older version of the driver that you had installed on your computer? Use the Last Known Good Configuration | Use Device Manager to roll back to the previous version of the driver. |
While discussing a computer problem with a user, you realize that solving the problem requires a level of expertise that you do not have. How should you handle this problem? Ask the user if you can transfer him to appropriate personnel. | Ask the user if you can transfer him to appropriate personnel. |
Andrea is concerned that she is being lured to provide her financial institution’s credentials on an invalid site via a message she received. Which type of attack is most likely taking place? IP Spoofing | Email Spoofing Explanation: IP Spoofing is a technique that hackers will use to gain unauthorized access to computers by using valid IP Addresses making it appear to be from a valid trusted host. Mining or Data Mining is a database application term that examines data to predict behaviors. MAC Address Spoofing occurs when an attacker changes the MAC Address of his computer to match that of a valid trusted host. |
Two months after completing a service call, a customer sends you an email message complaining about the work done. The customer also copies the message to your supervisor and other officers in your company. You locate the follow up report that was completed by the customer the day after the service was completed. In the report, the customer indicated he was satisfied with the work you completed. What should you do? Send a reply message and include everyone copied thanking the customer for his input and asking why he indicated satisfaction in your work on the Follow-Up Report after the work was completed. Have a meeting with all those who received the email message explaining to them why you feel the customer is wrong. Disregard the email. Call the customer and tell him why you think his actions are wrong. | Send a reply message and include everyone copied thanking the customer for his input and asking why he indicated satisfaction in your work on the Follow-Up Report after the work was completed. |
You have discovered that hackers are gaining access to your WEP wireless network. After researching, you discover that hackers are using War Driving. You need to protect against this type of attack. What should you do? (Choose ALL That Apply) Configure the WEP Protocol to WPA | Configure the WEP Protocol to WPA Explanation: |
Jane is new to the PC Tech world and is curious about ESD. Which steps would you tell her to use as a preventative measure against static electricity? (Choose ALL That Apply) Having proper grounding of building and outlets. | Have proper grounding of building and outlets | Wear Anti-Static Bands while servicing computer components |
Which factors generate and promote the transmission of electrostatic discharge (ESD) to devices? (Choose ALL That Apply) moving people humidity greater than 40% humidity less than 40% moving machines improper grounding | moving people |
Which of the following statements is True about an in-place upgrade and a clean installation? an in-place upgrade can always be used when upgrading from a previous OS version. an in-place upgrade installs the OS files and retains user settings. a clean installation installs the OS files and retains user settings. a clean installation does not require the reinstallation of applications. | an in-place upgrade installs the OS files and retains user settings. |
You are responsible for purchasing New Windows Computers for your company. The Computers must be able to join your Company's Domain. Which versions of Windows should you implement? (Choose ALL That Apply) Windows 7 Home Premium Windows 8 Pro Windows 7 Pro Windows 7 Starter Windows 7 Ultimate | Windows 8 Pro |
You need to provide a physical security measure for a data center located on the Second Floor of a building. Management wants you to implement the highest level of security possible. What physical security should you implement? ID Badges | Biometrics |
You launch Performance Monitor in Windows 7 Pro. Which components can you monitor using this tool? (Choose ALL That Apply) Memory | Memory |
You are researching Biometrics for Identification and Verification of employees in an organization. Which attributes or details of an employee can be used by Biometric Devices? (Choose ALL That Apply) Face Iris Fingerprints Hand Geometry Signature Hair | Face Iris Fingerprints Hand Geometry Signature Explanation: Others include - Voice Retina |
A user informs you that he cannot complete a task for his supervisor without an administrative password. The user will only have to complete this task once. What should you do to achieve the objective using the least administrator effort? Options: Change the user's account to an administrative level account. Return the account to its original state after the task is complete. Tell the user to ask his supervisor for the supervisor's account info. Create a Temp Administrative Account for the user. Delete the account after the task is complete. | Enter the Administrative Credentials yourself at the user's computer. |
An IT Tech has recently discovered an Evil Twin on your company's network. What is the best description of an Evil Twin? unauthorized access point | an access point with the same SSID as the legitimate access point Explanation: Rogue access point is an unauthorized access point that allows access to a secure network. Performing a site survey is the best way to discover rogue access points. War Chalking is leaving signals about the wireless network on the outside of the building. An IV attack is cracking WEP secret key using Initialization Vector (IV). |
Gloria is holding free computer maintenance classes in her community. In her Class, she emphasizes tools anyone can access and use. She spends alot of time discussing the DEFRAG tool. What should she tell them is the minimum free disk space needed to run this tool? 200 MB | 15% of Hard Drive Space |
Deborah has a brand new iPhone that she thinks is defective because it keeps losing battery power. What are three easy fixes she can do herself without having to take it in for a technical service? (Choose ALL That Apply) Dim the display Place in Airplane Mode Turn on Bluetooth Turn on WIFI Close out Background Apps | Dim the display |
A user contacts you stating that he believes that his computer is infected with Malware. Which symptoms may indicate that he is correct? (Choose ALL That Apply) low disk space warning alert browser redirection slower performance pop-ups junk email security alerts | browser redirection |
You need to view the processes running on a Linux System. Which command should you use? apt-get | ps |
Your organization is adopting a new password policy to increase security. Which policy is the most secure password policy? Password change requests must be made in writing. | Password change requests must be made in person. |
You are training two new computer techs on proper repair procedures. Which procedure should be performed off-site by a third party? flashing a BIOS chip | repairing a power supply for a cathode ray tube (CRT) |
You are training new users about software licensing, DRM, and EULA. Which of the following licensing models allow you to modify an application's code, creating a customized version of the software? Personal License | Open-Source License |
You need to establish a network connection on a Windows computer using the Setup a Connection or Network applet. Which one of these is NOT a valid connection type? Wireless | Line of Sight |
You need to broaden the area to which a wireless access point (AP) can transmit. What should you do? Relocate the AP | Adjust the power level setting slightly higher. |
You need to access a shared folder named research$. Which fact is true about this shared folder? It is a local share. | It is hidden |
You are a desktop engineer for a graphic design company. The network consists of fifteen Windows 7 Client computers. Server users report that the performance of the computers is degrading. You detect that there is low free disk space on the computers. To enhance the performance of the computers, you instruct the users to back up the data and remove unwanted applications that are installed on that computer to free disk space. What else should you instruct the users to do? (Choose Two) Run the Disk Defragmenter Utility Run the Scheduled Tasks Utility Run the Action Center Utility Run the Files and Settings Transfer Wizard Run the Disk Cleanup Utility | Run the Disk Defragmenter Utility | Run the Disk Cleanup Utility |
You need to download and install critical system updates, security patches or hotfixes, and upgrades for Windows components. Which Windows utility allows you to accomplish this? File and Settings Wizard | Windows Update |
Vivian wants to set permissions on a certain folder to allow users to modify data. What is she really allowing them to do with this type of permission? The user can Read, Write, Execute, and Delete everything, EXCEPT the Folder. | The user can Read, Write, Execute, and Delete everything, including the Folder. |
You have configured System Restore on the computers in your Network. Which condition will NOT result in a restore point being created? Upgrading Device Driver | Saving a New File |
Elizabeth has given her teenage son an iPhone for his birthday. She has enabled all the services required to use the Find My iPhone feature. Which security risk may occur as a result? Slow data speeds | unauthorized location tracking |
While installing a web camera on a Windows 7 computer, you receive a blue screen error. You are unable to boot to Windows after installing the web camera. Instead, each time you boot the computer, it shows the blue screen error message. What should you do to troubleshoot the problem using the least administrative effort? Boot the computer with a bootable USB flash drive. | Boot the computer using the Last Known Good Configuration |
A user contacts you asking if she should run the chkdsk command on her computer. Why would you use this command? To manage hard drive partitions | To check the specified drive and repair possible problems |
You have recently been hired as an IT Tech. You need to install Windows 7 on several computers on the Network. There are several installation options available. Move the correct items from the left column to the column on the right to match the installation type with the correct installation situation? Clean Installation Windows needs to be installed on multiple computers with identical hardware configurations | Clean Installation -- Windows should ignore the previous installation of Windows. |
You need to schedule several disk maintenance tasks on a Windows computer. Where should you go to schedule these tasks? Open Task Manager | Open Task Scheduler |
Nicola reports to the security guards that individuals are following closely when she enters buildings, using her credentials to gain access. She knows that some of them are valid employees but is concerned that not all of the people are. What security breach is she reporting? shoulder surfing | tailgating |
You are concerned that there is an unauthorized open port that is allowing connection to a malicious website. You need to view all of a computer's connections. Which command-line tool should you use? ipconfig | netstat |
You use two different backup and recovery options. For full backups, you use cloud storage, and for incremental backups you use local storage. What type of backup is an incremental backup? critical applications | file-level |
You are updating the offboarding procedures and policies for your organization. You need to retain a terminated employee's data while blocking the terminated employee's access to that data. Which Active Directory function should you implement? Password reset | Disable account |
Which activity is covered under the confidentiality objective of the CIA triad, and involves examining someone's computer to steal confidential information? social engineering | shoulder surfing |
Cathy is opening the case of a computer to add some memory and perform some additional maintenance. She wants to ensure that a static charge is not built up in her body. How can she proceed safely? she should use an ESD strap | she should use an ESD strap |
Which statement is more effective when dealing with a customer who keeps having the same problem? "You should have should won your computer properly." | "Often this type of problem is caused when a computer is not shut down properly." |
As stated in your organization's new password policy, you must configure how many new passwords must be created before an old one can be reused. Which policy should you use? password length password complexity password history password lockout password age | password history |
Your mobile device is fully charged. You have been traveling all day using your mobile device to make calls. However, when you travel into remote areas, calls mysteriously disconnect. What is the most likely problem with the device? slow data speeds | signal drop/weak signal |
Michael runs a mobile devices repair business and is responsible for keeping up to date with all mobile devices. What is one of the top common software issues he can expect to see on a regular basis? cracked screens | no Bluetooth connectivity |
You manage the workstations for your organization. You are concerned about the introduction of malicious software through seemingly harmless activities like listening to music on a flash drive. Which of the following security practices should you implement? Patch/Update management | Disable Autorun |
When you start Windows 7, an error message is displayed that indicates that a service failed to load. Which utility can you use to determine why the service failed to load? Network Monitor | Event Viewer |
Lee is complaining that his Windows 7 computer is having performance issues and is running slower. He wants to clean it up so it will run faster and more efficient. Which built-in tools would you recommend he use first? (Choose ALL That Apply) SFC Recovery Console Defrag Disk Cleanup Add/Remove Programs | Defrag |
Mary has inherited a bunch of older laptops that need their batteries replaced. Which statements are true regarding proper disposal of unusable and old Ni-cad batteries that she should utilize? Unusable Ni-cad batteries can be thrown in the garbage | Unusable Ni-cad batteries should be given to a hazardous waste disposal facility |
A user calls the help desk to report that her large Excel spreadsheet is not responding. You decide to examine Task Manager to troubleshoot. Which function of Task Manager will be the most helpful in resolving the issue? Identify limited connectivity | Kill tasks |
You are a desktop administrator for Nutex Corporation. A user in the human resources department is unable to open the browser on their computer. You go to the customer's desk to troubleshoot the problem. While you are there, you notice confidential documents regarding an employee's recent disciplinary action sitting next to the keyboard. What should you do? Read the information on the document, and inform your co-workers of its contents. | Turn the documents over. |
You are the desktop support technician for your company. You are working on a computer running Windows 7 that has two hard disk drives, named HDD1 and HDD2. You want to copy the entire file and folder structure from HDD1 to HDD2 in the most efficient manner. Which command-line tool should you use? xcopy. exe | xcopy.exe |
Which two methods would be the most effective in assisting with inventory management? (Choose Two) Barcodes | Barcodes | Asset Tags |
You are creating a presentation for company management on the pros and cons of mobile devices. What is the greatest threat to the security of mobile devices? GPS location services | theft |
You are providing remote support to a user with a Windows-Based computer. Which key combination should you tell the user to press to reboot the computer, open the Task Manager, or open the Windows Security window? ALT + TAB | CTRL + ALT + DEL |
A user asks you to describe how computers are infected with viruses. Which option is NOT usually a way that a virus infection occurs? through file sharing | through vendor installation CDs |
You have instructed users not to store passwords for web sites on their computers. You need to examine a user's computer to determine if the policy is being followed. Which Control Panel utility should you use? Programs and Features | Credential Manager |
Andrea is in an airport waiting for her flight to take off and preparing for her work presentation. Although the airport offers free WIFI, she uses her iPAD to edit her presentation and tethers it to her iPhone's personal hotspot. Why is this most likely a good practice? Slow data speed | possibility of leaked personal files and data |
You need to install Windows 8 on a client's computer. The computer does not have a network connection or an optical drive. Which of these installation options are available to you? PXE | USB |
You find a solution to a problem that directs you to edit a value in HKEYCURRENTUSER\Software\Microsoft\Windows\Current\Version\Policies. What system tool will allow you to accomplish this? REGEDIT | REGEDIT |
You need to refresh the group policy settings. Which command-line utility should you use? GPUPDATE | GPUPDATE |
While performing preventative maintenance on a user's computer, you notice several offensive files on the user's computer. Your computer does not have an Acceptable Use Policy. What should you do? Contact your supervisor | Contact your supervisor |
You are a new member of a workgroup, and you need to print a document. You do not have a printer attached to your computer, but a co-worker does. Other employees can print to that printer. What is the easiest way to print your document on the coworker's printer? Disconnect the printer from the co-worker's machine and connect it to yours. | Ask the co-worker to give you permissions to print to the printer. |
You are instructing your company's IT technicians on how to calibrate the screen of a touch screen device. The technicians will need to perform this step only in certain conditions. Which conditions will require this? (Choose ALL That Apply) Nothing happens when touching an application | nothing happens when touching an application | incorrect application opens |
You have just removed malware from a Windows 8 System. But every time you type a URL into Internet Explorer to navigate to a search engine, the same page is being displayed in the browser. After researching the issue, you realize that the computer has been infected with PUM.bad.proxy malware. Select the steps that could be used to resolve the malware infection. Only use those steps that will fix the problem. Choices: Edit the ProxyServer and ProxyEnable Registry keys in the HKEYCURRENTUSER\Software\Microsoft\Windows\CurrentVersion\Internet Settings Hive. On the Connections Tab of the Internet Properties Dialog Box, Click LAN Settings. In the LAN Settings Dialog Box, clear the Automatically Detect Settings Checkbox. On the Connections Tab of the Internet Properties Dialog box, check LAN Settings. In the LAN Settings Dialog Box, check the Bypass Proxy Server for Local Addressed Checkbox. | On the Connections Tab of the Internet Properties Dialog Box, click LAN Settings. In the LAN Settings Dialog Box, clear the Use a Proxy Server for LAN Checkbox. Edit the ProxyServer and ProxyEnable Registry Keys in the HKEYCURRENTUSER\Software\Microsoft\Windows\CurrentVersion\Internet Settings Hive. |
Kristen purchased a new laptop for her daughter Kate for her birthday. You have been asked to give Kate specific instructions on why she should avoid placing her new laptop on her lap without a laptop cooling pad underneath. What is the reason for this? It causes the hard drive to operate at an angle | It prohibits airflow through the openings on the bottom. |
Which statement is true regarding smart cards? Smart cards do not contain a microprocessor | Smart cards can be deactivated or replaced |
Your company has recently adopted several new security policies regarding mobile devices. Which mobile device application helps when a mobile device is stolen, but also raises privacy concerns? passcode applications | locator application |
You need to change a user's password on a Linux computer. Which command should you use? pwd | passwd |
You are working at a client site and need to connect securely to the network at your home office. Which secondary network connection will allow you to do that? Wireless | VPN |
A user named Mary reports receiving a Servce Failed to start error message every time she restarts her Windows 7 computer. Which utility should you use to determine which service is failing to start? Event Viewer | Event Viewer |
During a recent security audit, you discovered that several computers were infected with software that uses tracking cookies to collect and report a user's activities. Of which type of malware infection is this an example? virus | spyware |
You need to configure your Windows 7 computer so that it automatically connects to the Research share on a server named SRV1 each time your computer boots. You want this to be configured as the R Drive. You click Start and Computer. You select the Map Network Drive Option. The Map Network Drive Dialog Box is displayed. What should you do? In the Drive Field, select R. In the Folder Field, Enter \Research\SRV1. Select the Reconnect at Logon Option. Click Finish | In the Drive Field, select R. In the Folder Field, Enter \SRV1\Research. Select Reconnect at Logon Option. Click Finish |
Press F2 during the text mode of booting. | Boot from the Installation CD/DVD Explanation: Pressing F2 to start Automatic System Recovery is for Windows XP. Pressing F6 does not start ASR. F6 key is required to install a third-party SCSI or RAID driver during the Setup Process. The F6 key is provided strictly as a means to install OEM drivers for mass storage devices Only. Pressing F8 does not start ASR in Windows 7. F8 key is used to accept the End-User License Agreement during the setup process. You can also access the Advanced Boot Options Menu and the Windows Startup Menu by pressing F8 before Windows Starts. |
Replace the Battery | Completely drain the battery's charge, and then recharge it. Explanation: Placing the battery into Battery-Saving Mode will not resolve the issue. It is just keeping the battery from dying as quickly. |
Backup | Backup |
Windows 7 Home Basic | Windows 7 Professional | Windows 7 Enterprise |
Documented business process | Document business processes Explanation: End User Acceptance is often critical to the successful implementation of change. Things like open communication, how the change will impact their work life, the necessity of the change, and training will all go a long way towards ensuring end user acceptance. Plan for Change should not only address the known issues within the scope of the plan, but also address contingencies. What happens if additional personnel or resources are needed? What happens if the plan runs over budget, in terms of time and finances? What if the equipment does not perform as expected? Document Changes is not usually included in a Change Request although you should include it and it is very helpful. |
FDA Guidelines |
Explanation: |
Door Lock |
Explanation: Hardware Tokens are some types of physical object that a user must have during the login process to provide possession of the device. Door Locks require a KEY (Something you have…) to OPEN. Server Locks restrict access to the devices in the Server Cabinet and can only be open with a KEY (Something you have…) Biometric Devices are based on the security concept of "Something You Are". They match a user's uniquely identifiable physical attribute to a previously stored value. They are among the most secure physical security measures. |
Software application that displays advertisements while the application is executing. | Collection of programs that grants a hacker administrative access to a computer or network Explanation: Adware is software application that displays advertisements while the application is executing. Spyware often uses tracking cookies to collect and report a user's activities. Worm is a program that spreads itself through network connections.
|
Share Permissions include Read, Write, Modify, and Full Control | Share Permissions include Read, Write, Modify, and Full Control Explanation: |
HDMI Cable | Micro HDMI Cable | Miracast or Chromecast |
| geotracking Explanation: |
Safe Mode with Networking | Automated System Recovery |
| Antenna Placement |
You are creating a wireless network for your company. You need to implement a wireless protocol that provides maximum security while providing support for older wireless clients. Which protocol should you choose? WIFI Protected Access (WPA) | WIFI Protected Access (WPA) Explanation: |
Which of the following is an example of Phishing? email request from a financial institution asking you to log in and change your password using the provided link | email request from a financial institution asking you to login in and change your password using the provided link |
You need to implement security measures for the mobile devices that have been issued to company employees. Which security measure is considered to be the easiest to implement for mobile devices? GPS Locator Apps | Passcode Locks |
Christine, a user, has contacted you saying she wants to organize the contents of her My Documents folder into Subfolders. Which command should she use? dir | md (Make Directory - used to create new folders and subfolders.) Explanation: |
Barry wants to keep his data secure on his Android Device. Which feature should you advice him to use? PIN Lock | Encryption |
You arrive at a customer's home to fix a computer. The computer is located in the bedroom of the customer's 8 year old daughter. While attempting to fix the problem, the child repeatedly interrupts you and asks questions. What should you do? Take the computer back to your office to complete the repair. | Ask the parent to take the child into another room while you are working. |
A user has connected a second monitor to his Windows 7 Ultimate Computer. The new monitor is detected, however, the dual-monitor configuration is NOT configured as he wants it. What should the user do to change the dual-monitor configuration of the monitors? Right-Click the desktop and select Gadgets | Navigate to Control Panel > Appearance and Personalization > Display > Adjust Resolution |
While servicing some computer equipment, you overhear a conversation about company-wide pay raises. What should you do? Tell your supervisor about the pay raise. | Keep the information confidential. |
Thomas is teaching a class for New Users and wants to cover what to do and what not to do Online. He specifically discusses spyware and malware infections and how they occur. What are some of the Warning Signs he should teach them to be aware of? (Choose ALL That Apply) Taskbar or System Tray has strange icons. | Taskbar or System Tray has strange icons. |
Which technology allows users to freely access all systems to which their account has been granted access after performing an initial authentication?
| Single Sign-On (SSO) |
You need to update your backup and recovery policy. You have read that a company was out of business for quite some time when a tornado destroyed their neighborhood bank, and with it, the company's backup media. You want to re-examine and re-evaluate your backup and recovery policy to address this issue. What specific area should you re-evaluate? image-level backups | cloud storage VS local storage backups |
You need to locally install Windows 7 Ultimate on a new computer. Which installation method is most likely? Network | DVD |
When explaining the differences between NTFS and FAT32 to a user installing Windows 7, which three benefits would you share with them regarding NTFS? virus protection malware protection file encryption better security better disk space management | file encryption |
Recently, you upgraded a user's computer to a dual-core processor. The user complains that an applications performance did not increase after the upgrade. You need to ensure that the application fully utilizes the dual-core processor. What should you do? Upgrade the application to a version that supports multithreading | Upgrade the application to a version that supports multithreading |
A user has Windows 78 computer with 512 MB of RAM and two hard drives, named drive C and drive D. The Paging File is located on Drive C. The user complains that his computer does not perform well after running for a couple of hours. What should you tell the user to do? increase the size of the paging file | move the paging file to drive D |
All of the following are examples of Pirated Software - EXCEPT? installing software from the same installation CD using multiple licenses. | installing software from the same installation CD using multiple licenses. |
Sam is an experienced Android user. He has been hired by your department to support all the Mobile Devices in user by your organization. You must instruct him on backing up the data on an Apple Device. Your company only wants to use a solution that would allow devices to be restored from any location. Which app should you recommend? Google Drive | iCloud |
When explaining new equipment features to a customer, all of the following are acceptable practices EXCEPT? Avoid interrupting the customer | Use the correct acronyms with the customer |
A user reports that her mobile device is not working properly. When you research the issue, you discovery that she accidently deleted all of the data on her device. What has most likely occurred? factory reset | factory reset |
You are attending a class on network identification and authentication. What is the most common form of identification and authentication? biometrics | user identification with reusable password |
You are assembling a personal computer. You remove the packaging material from different hardware components, such as memory chip and motherboard. Where should you place these hardware components to prevent damage from positive and negative charges? Place them on a tile floor Hold them in your hands while wearing a pair of lint-free gloves Place them in an anti-static bag Place them on a piece of newspaper Place them on a wooden table | Place them in an anti-static bag |
You are sharing a portable computer with a vendor to work on a legacy application. What should you do to secure this computer from theft? Enable BitLocker | Use a T-bar locking mechanism Explanation: |
Wendy has decided to implement an uninterruptible power supply for several servers. Which functions can it provide her? (Choose ALL That Apply) surge protection | surge protection |
You know the IP Address of a computer that is downloading copyrighted material. Which of the following would help you to identify the location of that computer? Acceptable use policy | Network topology diagrams |
You are an onsite tech for your company and have been assigned the task of replacing a damaged motherboard in a customer's computer. You must carry the replacement working motherboard to the customer's residence. Which is the BEST method to carry the motherboard to the customer's residence? Carry the motherboard in a paper bag lined with Styrofoam. | Carry the motherboard in an anti-static bag |
You need to resize the disk partition to increase the storage capacity. Which OS Feature should you use? Disk Management | Disk Management |
Which Active Directory logical security concept would you implement to best protect a user's data in the event of a hard drive crash? Organizational Unit | Folder Redirection Explanation: |
Which of the following tablet operating systems typically follows a Yearly Schedule for major version updates? Microsoft Windows | Android |
A user has recently upgraded the video adapter drivers on a Windows 7 computer. Since that time, the computer has been continuously restarting. You tried rebooting the computer using the Last Known Good Configuration, but it does not affect the problem. What should you do to fix the problem using the least administrative effort? (Choose Two) Perform a fresh install of Windows 7 | Roll back the video adapter drivers. | Restart the computer in Safe Mode. |
You have several old computer parts in a storage room. Because you work for a company with an aggressive green policy, you want to reclaim as much material as possible from the components. What CANNOT be reclaimed? metal from the computer case | phosphorus from a CRT monitor with a broken screen |
Melissa loves to listen to music while she is working out. However, every time she walks into the gym, her Bluetooth headphones stop working. What could be the problem? (Choose Two) Other WIFI devices are trying to connect. | Her device is in discoverable mode. | Other Bluetooth devices are trying to connect. |
Clara took her son swimming and left her mobile device in the sun for too long. What can she do to get the Mobile device to turn on again? Replace the battery. | Remove the protective cover, and place the phone in a cooler environment. |
You need to Enable Wake on LAN. Where would you go first to do this? On the NIC | In the BIOS |
You have two wireless networks in your building. The wireless networks do not overlap. Both of them use WIFI Protected Access (WPA). You want to ensure that no unauthorized wireless access points are established. What should you do? Change the two wireless networks to WEP | Periodically complete a Site Survey |
You want to provide secure access to the research laboratory and ensure that only authorized persons can enter the laboratory's server room. Which system does NOT provide an effective means of ensuring that only authorized persons can enter the server room? biometric access control system | single sign-on system |
You install a New Device driver on your Windows 7 Computer. Upon restarting, the computer continuously reboots. You attempt to use the Last Known Good Configuration, but the computer still continuously reboots. What should you do next to fix the problem? Boot in Safe Mode, and reinstall the drivers. | Boot in Safe Mode, and Reinstall the Drivers. |
You are setting up networking on your work computer. You were given unique login credentials by the system administrator, who manages all credentials for thousands of employees. What type of network would this be? workgroup | domain |
A user's computer is infected with malicious software that spreads through the internet to collect user information, including browser habits. Which type of malware has infected this computer? viruses | spyware |
You plan to replace some components within a computer. As a recommended practice, what should be the FIRST step towards disassembling a computer? The Processor should be removed from the Motherboard | The Power Cord of the system case should be disconnected |
You want to prevent your computer from any type of Electrostatic Discharge (ESD) while servicing the computer. Which actions should you NOT perform while servicing the computer? (Choose Two) Ensure that the room in which the computer is serviced is carpeted. | Ensure that the room in which the computer is serviced is carpeted. Explanation: Cool and Dry conditions are prone to static electricity, and therefore should not service a computer in a cool and dry room. To prevent ESD, humidity in the server room should be maintained above and average of 45%. You should wear Anti-static Wristbands while servicing a computer. You should keep one hand in contact with the bare metal frame of the computer at all times. You should wear cotton clothes to prevent against ESD because other materials, such as synthetic and nylon are known to be conductors of static charge. |
A major system change is needed, and you are preparing a document for the Change Board. What is the Change Board's ultimate responsibility? identify the scope of the change | approve or reject the change |
Susan is constantly shutting down her laptop improperly due to moving from meeting to meeting. Which file is in jeopardy of being affected the most? Registry | Registry |
You need to view the contents of a Windows 10 update. Which command-line tool should you use? EXPAND | EXPAND Explanation: Extract - Allowed you to pull one or more files out of a CAB file. Deprecated in Windows XP and later. Copy - Allows you to duplicate a File or Folder XCopy - Duplicates a folder, including subfolders and files. Help - Can be used to display the contents of the Help File for a Command Exit - Used to Exit a Script or Batch File |
You want to define the number of days a password can be used before the user is required to change it. Which password policy should you configure? Enforce Password History | Maximum Password Age |
You are installing an OS on a Drive that appears to have Sector Issues. Which formatting option should you use? ExFAT | Full Format Explanation: (My Own) Quick Format is a Quick Format that only formats a drive, does no Error Checking or Fixing. Full Format does a FULL System Check, Error Check, Fix and does a Format but takes alot longer to finish. FAT - File Allocation Table is the legacy File System for Windows. Supports Partition size of 2GB. |
You are an IT Tech for a Company. You are required to implement CAT5 cabling for your company's network. The cable will run to each workstation along the floor. What should you do to secure the cables? Install cables using a protective channel | Install cables using a protective channel |
You open Device Manager and notice a RED X next to your Wireless Network Adapter. What does this indicate? The adapter was not installed properly | The adapter is disabled |
You are troubleshooting a computer issue at a customer location. Which guidelines should you follow? (Choose ALL That Apply) Ask clarifying questions | Ask clarifying questions |
You are documenting the proposal for a major change. What part of the documentation would address potential impact of failure? Risk analysis | Risk analysis Explanation: Documented business practices include items such as technical support procedures, customer service, ordering procedures. In general, this deals with company policies and procedures. Change request should thoroughly address the effect on documented business processes. Backout plan is a document that would outline how you will recover should something go awry. When you see that the implementation is not going as planned, the backout plan will allow you to get the systems back to an operating state. The backout plan does not address potential impact of the failure (Risk analysis), it only documents how to revert any changes to infrastructure and restore the earlier functionality or business systems. Scope of the change defines, among other things, the areas that will be address by the change, who will be responsible for implementing the change, what resources are needed, and a method to verify that the change has been completed, successfully or unsuccessfully. Also who is impacted by the change. |
You need to restore a Windows OS system to the way it was when the computer was shipped from the factory. What should you do? Press F8 during POST and select Advanced Boot > Repair Your Computer > System Image Recovery | Press F8 during POST and select Advanced Boot > Repair Your Computer > System Image Recovery |