COMPTI A+ 220-902

Description

Informática Quiz on COMPTI A+ 220-902, created by Fer Peruyero on 25/04/2017.
Fer Peruyero
Quiz by Fer Peruyero, updated more than 1 year ago
Fer Peruyero
Created by Fer Peruyero almost 7 years ago
5
0

Resource summary

Question 1

Question
A technician is tasked with removing a virus file that created a custom service. The technician has located the file to be removed using an antivirus scanner, but the scanner did not sucessfully remove the file. When the technician attempts to manually remove the file, an error message appears that says "The file is in use by another program" Which of the following tools would be the BEST to use to correct the issue?
Answer
  • Terminal
  • SFC
  • Event Viewer
  • Services Console
  • Recovery Console

Question 2

Question
A computer is displaying a pop-up message demanding payment or the hard drive will be encrypted. Which of the following BEST describes this type of malware?
Answer
  • Trojan
  • Rasomware
  • Spyware
  • Worm

Question 3

Question
Several users of a shared computer report that Windows often indicates an improper shutdown was experienced upon power on. Which of the following would be the BEST course of action to determine which user is responsible for causing the issue?
Answer
  • Review the System Log
  • Check msconfig utility
  • Checkboot. ini
  • Review the ntuser.dat file

Question 4

Question
After confirming BIOS support, technician has added a second video card and a new sound card to a computer’s motherboard. The computer continuously restarts. This is an indication of which of the following.
Answer
  • Incompatible sound card
  • Insufficient power supply
  • Insufficient memory
  • Defective video card

Question 5

Question
A computer on a Windows domain has been identified as not having the most current policy. Which of the following tools would a technician run on the local machine to rectify this?
Answer
  • gpresult
  • msconfig
  • ipconfig
  • gpupdate

Question 6

Question
A user running Windows 7 has reported that a computer has crashed and a BSOD displayed. The computer was restarted and now the user reports that it is running slower than usual, especially when multiple programs are open at the same time. The technician knows the system has 8GB of memory (2x 4G DIMMS), and suspects that the system has a faulty memory module and has disabled one of the DIMMs. Which of the following would a technician do to confirm that the OS is now only detecting 4GB of memory?
Answer
  • In the Control Panel, click Devices and Printers.
  • In the Control Panel, click System.
  • In the Control Panel, click Device Manager.
  • In the Control Panel, click Performance Information and Tools.

Question 7

Question
A technician needs to repurpose a hard drive that has confidential information on it. Which of the following methods is MOST appropriate?
Answer
  • Incineration
  • Overwrite
  • Degauss
  • Quick format

Question 8

Question
A newly deployed Windows PC cannot connect to the antivirus server on te local network for updates, but it can connect to other file servers and printers without issue. Which of the following is the MOST likely cause of this issue?
Answer
  • The PC's Windows firewall is misconfigured.
  • The PC has an incorrect IP address configured.
  • The PC is on the wrong wireless network.
  • The PC does not have remote assistance turned on.

Question 9

Question
Which of the following feautures of a mobile device operates the touch screen?
Answer
  • Gyroscope
  • Digitizer
  • Accelerometer
  • Geotracking

Question 10

Question
A user updates the video driver on the computer and it requests a restart after fists installation. The computer never gets past the loading windows page without rebooting. Which of the following should the technician use to resolve this issue without losing any vital files or programs?
Answer
  • Emergency Repair Disk
  • Restore from OEM image
  • System Recovery
  • Restore from backup

Question 11

Question
Which of the following tasks is automatically added to the task scheduler in Windows to keep hard disk performance up?
Answer
  • defrag
  • chkdsk
  • cleanmgr
  • diskpart

Question 12

Question
When securing a mobile device, which of the following ypes of screen locks is the MOST secure?
Answer
  • Fingerprint lock
  • Swipe lock
  • Passcode lock
  • Face lock

Question 13

Question
A technician has just upgraded RAM on user's workstation from 4GB to 8GB. The technician now wants to adjust the page file size on the system to the recommended Microsoft settings. Which of the following should be entered for the "Min" portion of the page file setting if using the best practices?
Answer
  • 4096 MB
  • 8192 MB
  • 12288 MB
  • 16328 MB

Question 14

Question
A user advises that a computer is displaying pop-ups when connected to the internet. After updating and running anti-malware software, the problem persists and the technical problems cannot be killed. Which of the following should be done NEXT to continue troubleshooting the problem?
Answer
  • Run msconfig to clean boot the computer.
  • Run Event Viewer to identify the cause.
  • Run System Restore to revert to previous state
  • Run Recovery Console to kill the processes

Question 15

Question
An IPS appliance is installed on the network. Which of the following is the purpose of the IPS?
Answer
  • To check the network for unwanted activity.
  • To check and stop unwanted activity.
  • To provide connectivity to the network.
  • To test the resilience of the network.

Question 16

Question
An end user needs to completely re-install Windows 7 on a home computer but it did not come with any OS discs. How would a technician accomplish this?
Answer
  • Recovery partition.
  • Primary partition.
  • System restore.
  • System refresh.

Question 17

Question
A google account on an Android device by default will synchronize to which of the following locations?
Answer
  • Cloud
  • SSD
  • PC Deskopt
  • MicroSD

Question 18

Question
A technician is tasked with analyzing computer settings managed by Microsoft Group Policy configuration. The technician wants to print a report to an HTML file for offline revision which Windows command line tool would allow the technician to accomplish this task?
Answer
  • gpedit.msc
  • gpupdate
  • gpresult
  • gpmc.msc

Question 19

Question
A network administrator notices a new WiFi connection has appeared as a wireless network choice and is always at the top of the list. As a result, users are constantly trying to connect to the wrong network. Which of the following should the administrator do to correct this issue?
Answer
  • Adjust the wireless router antennas to 90 degrees clockwise from the currentposition.
  • Ask the new wireless network owner to adjust the radio power level so it is listed below the company's network.
  • Set all of the WiFi users' wireless profiles to automatically connect to the company network.
  • Change the company's channel to a lower number than the new network's channel.

Question 20

Question
A technician has imported a .dll to fix a missing .dll issue on a PC. The application still does not run correctly and is reporting that the .dll is missing. Which of the following tools would the technician use to complete the import of the .dll?
Answer
  • gpresult
  • msconfig
  • regedit
  • gpupdate
  • regsrv32

Question 21

Question
A manager suspects a user has obtained movies protected by copyright using a torrent client. An incident response technician responds and verifies the user has indeed been violating company policy. Which of the following would be the next BEST step for this technician to perform?
Answer
  • Secure the workstation in a limited access facility.
  • Document the incident, purge all policy violating materials.
  • Inmediately delete all unauthorized materials.
  • Reprimand the user and apply a content filter to their profile.

Question 22

Question
An administrator has a virtual client running but cannot receive network connectivity. The host workstation is able to access the network. Which of the following would the administrator check on the host to repair the problem?
Answer
  • The cable connected to the network.
  • Virtual host nework adapter
  • USB host adapter
  • The domain of the virtual machine

Question 23

Question
An IT manager need to reimage 30 computers in a lab. The image has already been created and is ready to be deployed via the network. Which of the following tasks should be completed FIRST?
Answer
  • Boot from PXE
  • Install Windows using DVD.
  • Reboot computers with USB drive.
  • Press F8 while rebooting.

Question 24

Question
A new user reports trying to login to a workstation but, when pressing CTRL+ALT+DEL, they are asked for a PIN. Which of the following should be done NEXT?
Answer
  • Enter all password they have used in the past.
  • Verify a smart card has been issued.
  • Check the network cable.
  • Reboot the computer

Question 25

Question
A technician is navigating through a Windows OS via command prompt. The technician needs to display the content of a folder. Which of the following is the BEST option for accomplishing this task?
Answer
  • dir
  • ls
  • rd
  • cmd

Question 26

Question
A technician has been tasked with limiting the users who can connect to a network printer located centrally within an office environment. Which of the following tools would be the BEST to utilize to achieve this goal?
Answer
  • VPN
  • ACL
  • RDP
  • DLP

Question 27

Question
A company has subcribed to a cloud service, paying monthly for a block of services and being billed incementally when they exceed the monthly fee. Which of the following cloud concepts does this represent?
Answer
  • Measured Service.
  • Rapid elasticity.
  • On-demand.
  • Resource poolling.

Question 28

Question
A user needs to connect securely to the company network while working from a hotel room. Which of the following would the user need available to accomplish this?
Answer
  • AES
  • VPN
  • UTM
  • WPA2

Question 29

Question
A technician is tasked to install a 4TB SATA hard disk. Which of the following partitioning technologies should the technician use to satisfy these requirements?
Answer
  • GPT
  • Logical
  • MBR
  • Extended

Question 30

Question
A technician would like to remove the dust inside of a desktop computer. Which of the following should the technician use to MINIMIZE exposure to the dust while protecting internal hardware components? (SELECT TWO)
Answer
  • Mask
  • ESD mat
  • ESD strap
  • Antistatic bag
  • Safety googles
  • Rubber gloves.

Question 31

Question
A technician is troubleshooting a PC with multiple volumes. To verify which are active and assigned drive letters, th technician should use the LIST function of which of the following commands?
Answer
  • extract
  • diskpart
  • bootrec
  • chkdsk

Question 32

Question
A company is concerned about users tailgating into restricted aresas, In order to prevent unauthorized users from following others, which of the following should be implemented?
Answer
  • Biometric locks
  • CCTV
  • Mantraps
  • Badge Readers

Question 33

Question
A technician needs to quickly destroy data on several hard drives that are no longer wanted. Which of the following methods is MOST effective?
Answer
  • Physical destruction
  • Quick format
  • Low level format
  • Overwrite

Question 34

Question
Ann, a user, states that after installing an update on her iPhone, the WiFi starts to malfunction. The WiFi icon is displaying that it has connectivity but she is still unable to browse. Which of the following could be the issue?
Answer
  • PRAM needs to be reset
  • iCloud is corrupted
  • The router needs to be rebooted
  • The upgrade needs to be uninstalled

Question 35

Question
A technician has upgraded four computers and would like to securely repurpose the hard drives for later use. Which of the following should the technician do to the drives to prepare them for later use?
Answer
  • chkdsk
  • Degauss
  • Quick format
  • Drive wipe

Question 36

Question
A user has been granted permission to access the corporate network from a personal smarthphone. Which of the following should a technician perform before configuring the phone for access?
Answer
  • Check the phone for unauthorized root access.
  • Disable the phone's Bluetooth chip.
  • Erase all personal data from the phone.
  • Check the phone for location tracking.

Question 37

Question
How would a technician install Windows OS on a MAC OS computer without using third-party software?
Answer
  • Terminal
  • Boot Disk
  • Disk Utility
  • Boot Camp

Question 38

Question
Joe, a user, returned yesterday from a trip where he utilized the GPS function of his mobile device. He now notices the baterry is rapidly draining. Which of the following can Joe MOST likely do to resolve the issue without loss of data?
Answer
  • Restart the mobile device.
  • Update the device's firmware.
  • Uninstall the GPS-enbled app.
  • Readjust the location settings.

Question 39

Question
A user wants to be able to access email from all devices. Which of the following formats should be used to allow this synchronization?
Answer
  • SMTP
  • iCal
  • POP3
  • IMAP

Question 40

Question
A customer has recently installed several application on Windows 7 workstation and is now experiencing slow system performance and spontaneous restarts. After removing some of the recently installed applications, the issue persists. Which of the following tools could the technician use to troubleshoot the problem while preventing data loss?
Answer
  • Factory restore
  • SecureBoot
  • msconfig
  • diskpart

Question 41

Question
An administrator is in a Remote Assistance session, sharing a user's desktop. While trying to map a shared network drive for the user, an "access denied" error is encountered while using the user's credentials. Which of the following should be the administrator's NEXT step?
Answer
  • Ensure the user's account is not locked out.
  • Use the fully qualified domain name of the share.
  • Open the location with administrator privileges.
  • Try mapping with a different drive letter.

Question 42

Question
A customer is experiencing issues with emil and calls the help desk. The technician determines it would help clarigy the issue if the cutomer agrees to share their desktop. Prior to establishing a Remote Desktop Assistance connection with a customer, a technician should ask the customer to:
Answer
  • Close any items of a personal nature.
  • Reboot the computer and log back in.
  • Capture a screen-shot of the error message.
  • take steps to reproduce the error.

Question 43

Question
A technician is tasked with installing Windows on numerous network PC's. Which of the following is the QUICKEST method for getting a standard configuration to the PCs?
Answer
  • Prebuilt image using PXE
  • Single solid state/flash drive with answer file.
  • Hot swappable image drive.
  • Internal hard drive partition with the image.

Question 44

Question
A technician has decided to upgrade all user's iPhones to the latest model. Which of the following is the FIRST thing the technician should advise to do with the old phones before turning them in?
Answer
  • Back up the mobile data with a cloud backup service.
  • Enable remote wipe to clear all personal and corporate data.
  • Go into the device settings to remove personal customizations.
  • Factory reset the old phones to ensure the data is no longer on the device.

Question 45

Question
A technician needs to perform a backup while a system is runnig. Which of the following services allows this task to be accomplished?
Answer
  • Robocopy
  • Shadow copy
  • Xcopy
  • System restore

Question 46

Question
A technician is working on a home theater PC in a location where the electrical system may not be properly grounded. As the technician is finishing the installation, which of the followig should the computer technician do before connecting a cable TV line to a TV tuner card?
Answer
  • Perform self-grounding.
  • Unplug the computer power cable.
  • Use an ESD strap
  • Require the electrical system be brought up to code

Question 47

Question
While navigating a Windows machine through command prompt, which of the following commands will a technician use to display the contents of the current folder?
Answer
  • cd
  • dir
  • md
  • rd

Question 48

Question
A user is having issues with a Windows computer. Upon loading the operating system, several messages appear referring to a DLL file that cannot be found. Which of the following would be the BEST course of action for the technician to perform NEXT?
Answer
  • Copy the DLL file from a working PC and use the regsvr32 command to load the file.
  • Run the Windows Update utility to manually reinstall the DLL file.
  • Run the defrag utility to correct any fragmentation that may have damaged the file.
  • Research the DLL file to identify the application it corresponds to before continuing.

Question 49

Question
Which of the following updates should be performed on a regular basis to ensure the OS has the latest security patches?
Answer
  • Anti-malware updates.
  • Driver updates.
  • Windows updates.
  • Firmware updates.

Question 50

Question
In preparation for an operating system upgrade, a technician is tasked with installing additional memory modules in a computer. Which of the following safety steps should be performed FIRST?
Answer
  • Use safety googles
  • Remove jewerly
  • Put on and ESD strap
  • Disconnect power.

Question 51

Question
A network administrator needs to connect to resources from an offsite location while ensuring the traffic is protected. Which of the following should the administrator use to gain access to the secure network?
Answer
  • SSH
  • VPN
  • SFTP
  • RDP

Question 52

Question
An end user receives an unsolicited and unencrypted email containing a co-workers birth date and social security number. The end user should inmediately contact the IT department and report a violation of which of the following policies?
Answer
  • DRM
  • EULA
  • IRP
  • PII

Question 53

Question
Which of the following is a risk of implementing a BYOD policy?
Answer
  • Introducing malware onto the network.
  • DHCP may fail due to incompatibility.
  • Different encryption technology.
  • Higher risk of phishing attacks.

Question 54

Question
A user calls the helpdesk reporting that when accessing the company portal, it redirects to an unfamiliar website. Which of the following steps would the technician take to resolve this issue using bet practices?
Answer
  • Identify symptoms, quarantine infected system, and create restore point.
  • Quarantine infected system, identify symptoms, and create restore point.
  • Identify symptoms, educate end user, and create restore point.
  • Create restore point, identify symptoms, and quarantine infected system.

Question 55

Question
A technician has purchased a new surge protector to protect equipment in the production environment. The surge protector's features safeguard the connected equipment by directing surges to the:
Answer
  • path of shortest conductance.
  • path of lowest inductance.
  • path of highest voltage.
  • path of least resistance.
Show full summary Hide full summary

Similar

FUNDAMENTOS DE REDES DE COMPUTADORAS
anhita
INGENIERIA DE MATERIALES
Ricardo Álvarez
Elementos Básicos de Ingeniería Ambiental
Evilus Rada
Test: "La computadora y sus partes"
Dayana Quiros R
Abreviaciones comunes en programación web
Diego Santos
Seguridad en la red
Diego Santos
Introducción a la Ingeniería de Software
David Pacheco Ji
Excel Básico-Intermedio
Diego Santos
Evolución de la Informática
Diego Santos
Conceptos básicos de redes
ARISAI DARIO BARRAGAN LOPEZ
La ingenieria de requerimientos
Sergio Abdiel He