Fer Peruyero
Quiz by , created more than 1 year ago

Informática Quiz on COMPTI A+ 220-902, created by Fer Peruyero on 25/04/2017.

5
0
0
Fer Peruyero
Created by Fer Peruyero about 7 years ago
Close

COMPTI A+ 220-902

Question 1 of 55

1

A technician is tasked with removing a virus file that created a custom service. The technician has located the file to be removed using an antivirus scanner, but the scanner did not sucessfully remove the file. When the technician attempts to manually remove the file, an error message appears that says "The file is in use by another program" Which of the following tools would be the BEST to use to correct the issue?

Select one of the following:

  • Terminal

  • SFC

  • Event Viewer

  • Services Console

  • Recovery Console

Explanation

Question 2 of 55

1

A computer is displaying a pop-up message demanding payment or the hard drive will be encrypted. Which of the following BEST describes this type of malware?

Select one of the following:

  • Trojan

  • Rasomware

  • Spyware

  • Worm

Explanation

Question 3 of 55

1

Several users of a shared computer report that Windows often indicates an improper shutdown was experienced upon power on. Which of the following would be the BEST course of action to determine which user is responsible for causing the issue?

Select one of the following:

  • Review the System Log

  • Check msconfig utility

  • Checkboot. ini

  • Review the ntuser.dat file

Explanation

Question 4 of 55

1

After confirming BIOS support, technician has added a second video card and a new sound card to a computer’s motherboard. The computer continuously restarts. This is an indication of which of the following.

Select one of the following:

  • Incompatible sound card

  • Insufficient power supply

  • Insufficient memory

  • Defective video card

Explanation

Question 5 of 55

1

A computer on a Windows domain has been identified as not having the most current policy. Which of the following tools would a technician run on the local machine to rectify this?

Select one of the following:

  • gpresult

  • msconfig

  • ipconfig

  • gpupdate

Explanation

Question 6 of 55

1

A user running Windows 7 has reported that a computer has crashed and a BSOD displayed. The computer was restarted and now the user reports that it is running slower than usual, especially when multiple programs are open at the same time. The technician knows the system has 8GB of memory (2x 4G DIMMS), and suspects that the system has a faulty memory module and has disabled one of the DIMMs. Which of the following would a technician do to confirm that the OS is now only detecting 4GB of memory?

Select one of the following:

  • In the Control Panel, click Devices and Printers.

  • In the Control Panel, click System.

  • In the Control Panel, click Device Manager.

  • In the Control Panel, click Performance Information and Tools.

Explanation

Question 7 of 55

1

A technician needs to repurpose a hard drive that has confidential information on it. Which of the following methods is MOST appropriate?

Select one of the following:

  • Incineration

  • Overwrite

  • Degauss

  • Quick format

Explanation

Question 8 of 55

1

A newly deployed Windows PC cannot connect to the antivirus server on te local network for updates, but it can connect to other file servers and printers without issue. Which of the following is the MOST likely cause of this issue?

Select one of the following:

  • The PC's Windows firewall is misconfigured.

  • The PC has an incorrect IP address configured.

  • The PC is on the wrong wireless network.

  • The PC does not have remote assistance turned on.

Explanation

Question 9 of 55

1

Which of the following feautures of a mobile device operates the touch screen?

Select one of the following:

  • Gyroscope

  • Digitizer

  • Accelerometer

  • Geotracking

Explanation

Question 10 of 55

1

A user updates the video driver on the computer and it requests a restart after fists installation. The computer never gets past the loading windows page without rebooting. Which of the following should the technician use to resolve this issue without losing any vital files or programs?

Select one of the following:

  • Emergency Repair Disk

  • Restore from OEM image

  • System Recovery

  • Restore from backup

Explanation

Question 11 of 55

1

Which of the following tasks is automatically added to the task scheduler in Windows to keep hard disk performance up?

Select one of the following:

  • defrag

  • chkdsk

  • cleanmgr

  • diskpart

Explanation

Question 12 of 55

1

When securing a mobile device, which of the following ypes of screen locks is the MOST secure?

Select one of the following:

  • Fingerprint lock

  • Swipe lock

  • Passcode lock

  • Face lock

Explanation

Question 13 of 55

1

A technician has just upgraded RAM on user's workstation from 4GB to 8GB. The technician now wants to adjust the page file size on the system to the recommended Microsoft settings. Which of the following should be entered for the "Min" portion of the page file setting if using the best practices?

Select one of the following:

  • 4096 MB

  • 8192 MB

  • 12288 MB

  • 16328 MB

Explanation

Question 14 of 55

1

A user advises that a computer is displaying pop-ups when connected to the internet. After updating and running anti-malware software, the problem persists and the technical problems cannot be killed. Which of the following should be done NEXT to continue troubleshooting the problem?

Select one of the following:

  • Run msconfig to clean boot the computer.

  • Run Event Viewer to identify the cause.

  • Run System Restore to revert to previous state

  • Run Recovery Console to kill the processes

Explanation

Question 15 of 55

1

An IPS appliance is installed on the network. Which of the following is the purpose of the IPS?

Select one of the following:

  • To check the network for unwanted activity.

  • To check and stop unwanted activity.

  • To provide connectivity to the network.

  • To test the resilience of the network.

Explanation

Question 16 of 55

1

An end user needs to completely re-install Windows 7 on a home computer but it did not come with any OS discs. How would a technician accomplish this?

Select one of the following:

  • Recovery partition.

  • Primary partition.

  • System restore.

  • System refresh.

Explanation

Question 17 of 55

1

A google account on an Android device by default will synchronize to which of the following locations?

Select one of the following:

  • Cloud

  • SSD

  • PC Deskopt

  • MicroSD

Explanation

Question 18 of 55

1

A technician is tasked with analyzing computer settings managed by Microsoft Group Policy configuration. The technician wants to print a report to an HTML file for offline revision which Windows command line tool would allow the technician to accomplish this task?

Select one of the following:

  • gpedit.msc

  • gpupdate

  • gpresult

  • gpmc.msc

Explanation

Question 19 of 55

1

A network administrator notices a new WiFi connection has appeared as a wireless network choice and is always at the top of the list. As a result, users are
constantly trying to connect to the wrong network. Which of the following should the administrator do to correct this issue?

Select one of the following:

  • Adjust the wireless router antennas to 90 degrees clockwise from the currentposition.

  • Ask the new wireless network owner to adjust the radio power level so it is listed below the company's network.

  • Set all of the WiFi users' wireless profiles to automatically connect to the company network.

  • Change the company's channel to a lower number than the new network's channel.

Explanation

Question 20 of 55

1

A technician has imported a .dll to fix a missing .dll issue on a PC. The application still does
not run correctly and is reporting that the .dll is missing. Which of the following tools would
the technician use to complete the import of the .dll?

Select one of the following:

  • gpresult

  • msconfig

  • regedit

  • gpupdate

  • regsrv32

Explanation

Question 21 of 55

1

A manager suspects a user has obtained movies protected by copyright using a torrent client. An incident response technician responds and verifies the user has
indeed been violating company policy. Which of the following would be the next BEST step for this technician to perform?

Select one of the following:

  • Secure the workstation in a limited access facility.

  • Document the incident, purge all policy violating materials.

  • Inmediately delete all unauthorized materials.

  • Reprimand the user and apply a content filter to their profile.

Explanation

Question 22 of 55

1

An administrator has a virtual client running but cannot receive network connectivity. The host workstation is able to access the network. Which of the following would the administrator check on the host to repair the problem?

Select one of the following:

  • The cable connected to the network.

  • Virtual host nework adapter

  • USB host adapter

  • The domain of the virtual machine

Explanation

Question 23 of 55

1

An IT manager need to reimage 30 computers in a lab. The image has already been created and is ready to be deployed via the network. Which of the following tasks should be completed FIRST?

Select one of the following:

  • Boot from PXE

  • Install Windows using DVD.

  • Reboot computers with USB drive.

  • Press F8 while rebooting.

Explanation

Question 24 of 55

1

A new user reports trying to login to a workstation but, when pressing CTRL+ALT+DEL, they are asked for a PIN. Which of the following should be done NEXT?

Select one of the following:

  • Enter all password they have used in the past.

  • Verify a smart card has been issued.

  • Check the network cable.

  • Reboot the computer

Explanation

Question 25 of 55

1

A technician is navigating through a Windows OS via command prompt. The technician needs to display the content of a folder. Which of the following is the BEST option for accomplishing this task?

Select one of the following:

  • dir

  • ls

  • rd

  • cmd

Explanation

Question 26 of 55

1

A technician has been tasked with limiting the users who can connect to a network printer located centrally within an office environment. Which of the following tools would be the BEST to utilize to achieve this goal?

Select one of the following:

  • VPN

  • ACL

  • RDP

  • DLP

Explanation

Question 27 of 55

1

A company has subcribed to a cloud service, paying monthly for a block of services and being billed incementally when they exceed the monthly fee. Which of the following cloud concepts does this represent?

Select one of the following:

  • Measured Service.

  • Rapid elasticity.

  • On-demand.

  • Resource poolling.

Explanation

Question 28 of 55

1

A user needs to connect securely to the company network while working from a hotel room. Which of the following would the user need available to accomplish this?

Select one of the following:

  • AES

  • VPN

  • UTM

  • WPA2

Explanation

Question 29 of 55

1

A technician is tasked to install a 4TB SATA hard disk. Which of the following partitioning technologies should the technician use to satisfy these requirements?

Select one of the following:

  • GPT

  • Logical

  • MBR

  • Extended

Explanation

Question 30 of 55

1

A technician would like to remove the dust inside of a desktop computer. Which of the following should the technician use to MINIMIZE exposure to the dust while protecting internal hardware components? (SELECT TWO)

Select one or more of the following:

  • Mask

  • ESD mat

  • ESD strap

  • Antistatic bag

  • Safety googles

  • Rubber gloves.

Explanation

Question 31 of 55

1

A technician is troubleshooting a PC with multiple volumes. To verify which are active and assigned drive letters, th technician should use the LIST function of which of the following commands?

Select one of the following:

  • extract

  • diskpart

  • bootrec

  • chkdsk

Explanation

Question 32 of 55

1

A company is concerned about users tailgating into restricted aresas, In order to prevent unauthorized users from following others, which of the following should be implemented?

Select one of the following:

  • Biometric locks

  • CCTV

  • Mantraps

  • Badge Readers

Explanation

Question 33 of 55

1

A technician needs to quickly destroy data on several hard drives that are no longer wanted. Which of the following methods is MOST effective?

Select one of the following:

  • Physical destruction

  • Quick format

  • Low level format

  • Overwrite

Explanation

Question 34 of 55

1

Ann, a user, states that after installing an update on her iPhone, the WiFi starts to malfunction. The WiFi icon is displaying that it has connectivity but she is still unable to browse. Which of the following could be the issue?

Select one of the following:

  • PRAM needs to be reset

  • iCloud is corrupted

  • The router needs to be rebooted

  • The upgrade needs to be uninstalled

Explanation

Question 35 of 55

1

A technician has upgraded four computers and would like to securely repurpose the hard drives for later use. Which of the following should the technician do to the drives to prepare them for later use?

Select one of the following:

  • chkdsk

  • Degauss

  • Quick format

  • Drive wipe

Explanation

Question 36 of 55

1

A user has been granted permission to access the corporate network from a personal smarthphone. Which of the following should a technician perform before configuring the phone for access?

Select one of the following:

  • Check the phone for unauthorized root access.

  • Disable the phone's Bluetooth chip.

  • Erase all personal data from the phone.

  • Check the phone for location tracking.

Explanation

Question 37 of 55

1

How would a technician install Windows OS on a MAC OS computer without using third-party software?

Select one of the following:

  • Terminal

  • Boot Disk

  • Disk Utility

  • Boot Camp

Explanation

Question 38 of 55

1

Joe, a user, returned yesterday from a trip where he utilized the GPS function of his mobile device. He now notices the baterry is rapidly draining. Which of the following can Joe MOST likely do to resolve the issue without loss of data?

Select one of the following:

  • Restart the mobile device.

  • Update the device's firmware.

  • Uninstall the GPS-enbled app.

  • Readjust the location settings.

Explanation

Question 39 of 55

1

A user wants to be able to access email from all devices. Which of the following formats should be used to allow this synchronization?

Select one of the following:

  • SMTP

  • iCal

  • POP3

  • IMAP

Explanation

Question 40 of 55

1

A customer has recently installed several application on Windows 7 workstation and is now experiencing slow system performance and spontaneous restarts. After removing some of the recently installed applications, the issue persists. Which of the following tools could the technician use to troubleshoot the problem while preventing data loss?

Select one of the following:

  • Factory restore

  • SecureBoot

  • msconfig

  • diskpart

Explanation

Question 41 of 55

1

An administrator is in a Remote Assistance session, sharing a user's desktop. While trying to map a shared network drive for the user, an "access denied" error is encountered while using the user's credentials. Which of the following should be the administrator's NEXT step?

Select one of the following:

  • Ensure the user's account is not locked out.

  • Use the fully qualified domain name of the share.

  • Open the location with administrator privileges.

  • Try mapping with a different drive letter.

Explanation

Question 42 of 55

1

A customer is experiencing issues with emil and calls the help desk. The technician determines it would help clarigy the issue if the cutomer agrees to share their desktop. Prior to establishing a Remote Desktop Assistance connection with a customer, a technician should ask the customer to:

Select one of the following:

  • Close any items of a personal nature.

  • Reboot the computer and log back in.

  • Capture a screen-shot of the error message.

  • take steps to reproduce the error.

Explanation

Question 43 of 55

1

A technician is tasked with installing Windows on numerous network PC's. Which of the following is the QUICKEST method for getting a standard configuration to the PCs?

Select one of the following:

  • Prebuilt image using PXE

  • Single solid state/flash drive with answer file.

  • Hot swappable image drive.

  • Internal hard drive partition with the image.

Explanation

Question 44 of 55

1

A technician has decided to upgrade all user's iPhones to the latest model. Which of the following is the FIRST thing the technician should advise to do with the old phones before turning them in?

Select one of the following:

  • Back up the mobile data with a cloud backup service.

  • Enable remote wipe to clear all personal and corporate data.

  • Go into the device settings to remove personal customizations.

  • Factory reset the old phones to ensure the data is no longer on the device.

Explanation

Question 45 of 55

1

A technician needs to perform a backup while a system is runnig. Which of the following services allows this task to be accomplished?

Select one of the following:

  • Robocopy

  • Shadow copy

  • Xcopy

  • System restore

Explanation

Question 46 of 55

1

A technician is working on a home theater PC in a location where the electrical system may not be properly grounded. As the technician is finishing the installation, which of the followig should the computer technician do before connecting a cable TV line to a TV tuner card?

Select one of the following:

  • Perform self-grounding.

  • Unplug the computer power cable.

  • Use an ESD strap

  • Require the electrical system be brought up to code

Explanation

Question 47 of 55

1

While navigating a Windows machine through command prompt, which of the following commands will a technician use to display the contents of the current folder?

Select one of the following:

  • cd

  • dir

  • md

  • rd

Explanation

Question 48 of 55

1

A user is having issues with a Windows computer. Upon loading the operating system, several messages appear referring to a DLL file that cannot be found. Which of the following would be the BEST course of action for the technician to perform NEXT?

Select one of the following:

  • Copy the DLL file from a working PC and use the regsvr32 command to load the file.

  • Run the Windows Update utility to manually reinstall the DLL file.

  • Run the defrag utility to correct any fragmentation that may have damaged the file.

  • Research the DLL file to identify the application it corresponds to before continuing.

Explanation

Question 49 of 55

1

Which of the following updates should be performed on a regular basis to ensure the OS has the latest security patches?

Select one of the following:

  • Anti-malware updates.

  • Driver updates.

  • Windows updates.

  • Firmware updates.

Explanation

Question 50 of 55

1

In preparation for an operating system upgrade, a technician is tasked with installing additional memory modules in a computer. Which of the following safety steps should be performed FIRST?

Select one of the following:

  • Use safety googles

  • Remove jewerly

  • Put on and ESD strap

  • Disconnect power.

Explanation

Question 51 of 55

1

A network administrator needs to connect to resources from an offsite location while ensuring the traffic is protected. Which of the following should the administrator use to gain access to the secure network?

Select one of the following:

  • SSH

  • VPN

  • SFTP

  • RDP

Explanation

Question 52 of 55

1

An end user receives an unsolicited and unencrypted email containing a co-workers birth date and social security number. The end user should inmediately contact the IT department and report a violation of which of the following policies?

Select one of the following:

  • DRM

  • EULA

  • IRP

  • PII

Explanation

Question 53 of 55

1

Which of the following is a risk of implementing a BYOD policy?

Select one of the following:

  • Introducing malware onto the network.

  • DHCP may fail due to incompatibility.

  • Different encryption technology.

  • Higher risk of phishing attacks.

Explanation

Question 54 of 55

1

A user calls the helpdesk reporting that when accessing the company portal, it redirects to an unfamiliar website. Which of the following steps would the technician take to resolve this issue using bet practices?

Select one of the following:

  • Identify symptoms, quarantine infected system, and create restore point.

  • Quarantine infected system, identify symptoms, and create restore point.

  • Identify symptoms, educate end user, and create restore point.

  • Create restore point, identify symptoms, and quarantine infected system.

Explanation

Question 55 of 55

1

A technician has purchased a new surge protector to protect equipment in the production environment. The surge protector's features safeguard the connected equipment by directing surges to the:

Select one of the following:

  • path of shortest conductance.

  • path of lowest inductance.

  • path of highest voltage.

  • path of least resistance.

Explanation