CompTIA A+ Quiz 4 - Professor Glasser
A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom. Which of the following needs to be adjusted on the workstation to fix the issue?
Date and time 
UEFI boot mode 
Logon times 
User access control
A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server. Which of the following Control Panel utilities should the technician use to configure the setting?
Internet Options – Advanced 
Internet Options – Connections
Internet Options – Security 
Internet Options – Content 
Internet Options – Privacy 
Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time because he has already tried everything that has been suggested.  Which of the following should the technician do? 
Since Joe is concerned about time, suggest calling back later when Joe has more time to troubleshoot 
Record the call and send it to the local intranet for future technicians to learn how to deal with calls like this one 
Ask more open-ended questions to see if the issue can be narrowed down in order to properly identify the issue and save time 
Inform the customer that there is a troubleshooting script that must be followed to get the issue resolved 
A SOHO customer has recently experienced a major hurricane. The customer has no backups and has lost all data and hardware associated with the company. The customer calls a contractor to assist in the rebuilding process and needs suggestions on the best way to prevent this from happening again.  Which of the following recommendations should the contractor give to the customer? (Choose two.)
Backup testing 
Cloud storage 
Local storage backups 
Data recovery 
Hot site 
Waterproof devices 
A technician has identified malware on a user’s system.  Which of the following should the technician do NEXT according to malware removal best practices? 
Enable System Restore and create a restore point so no data is lost 
Educate the user about how to avoid malware in the future 
Update the antivirus software and run a full system scan 
Move the infected system to a lab with no network connectivity 
A user’s Windows laptop has become consistently slower over time. The technician checks the CPU utilization and sees that it varies between 95% and 100%. After the technician closes some running applications, the CPU utilization drops to approximately 20%, and the laptop runs much faster. The next day the same user calls again with the same problem.  Which of the following is a tool the technician can use to resolve the issue?
Task Manager 
MSTSC
MSConfig 
PerfMon
A manager requests remote access to a server after hours and on weekends to check data. The manager insists on using the server.  Before granting the access, which of the following is the MOST important step a technician can take to protect against possible infection?
Create a policy to remove Internet access from the server during off hours 
Set the local antivirus software on the server to update and scan daily 
Ensure the server is patched with the latest security updates 
Educate the manager on safe Internet browsing practices 
A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately. With which of the following types of infections are the PCs MOST likely infected? (Choose two.)
Spyware
Zombies
Virus
Ransomware
Worm
Botnet
Ann, a user, is attempting to log in to her email service form a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid. Ann then decides to reset her email password, but after the reset, the new credentials still do not work in the third-party email client. Which of the following settings or features is responsible for the problems Ann is experiencing?
Full device encryption 
Account lock 
Multifactor authentication 
Strong password requirements 
In which of the following file extension types would a user expect to see the command. “net use T:\\server\files”? 
.bat
.vbs 
.js 
.py 
A user contacts a technician to troubleshoot server errors. The user explains that some files will not open on the server, the data backups are operational, and the weather has been bad. The technician notices missing time slots in the event log.  Which of the following should the technician replace to prevent these issues in the future?
System memory 
Surge protector
Hard drives 
Battery backup 
Ann, a user, calls the help desk regarding an issue on her laptop. While working remotely, she appears to be connecting to WiFi but is unable to retrieve her corporate email. The wireless name is listed as “ConnectMe” and appears as unsecure. Which of the following should the help desk perform to fix the issue?
Remote into Ann’s system and restart the wireless adapter 
Ask Ann to open a browser and watch for a redirect page 
Advice Ann to plug an Ethernet cable into her laptop 
Direct Ann to run an antivirus program on her laptop 
A project team is organized to implement a new wireless solution for a school. The team has already done the network diagrams and knows the locations that will need to be addressed in the project. The team is in the process of creating an SOW for the project as a whole and needs to add the critical pieces to the SOW to complete it and move to the next stage.  Which of the following would the project team MOST likely add to the SOW?
Risk analysis 
Plan to change 
Backout plan 
Change board approvals 
A user calls the help desk regarding a new Windows issue that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem.  Which of the following would MOST likely fix the issue?
Roll back updates 
Disable the Windows Update service 
Check for updates
Restore hidden updates 
A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources.   Which of the following protocols and authentication methods should the technician implement? (Choose two.)
WPA
WPA2 
WEP
TKIP
RADIUS 
Multifactor
TACACS 
SSO 
Ann, an employee at a company, calls the help desk to report issues logging on to a vendor’s website. Joe, the technician, is able to log in successfully with his credentials before going to Ann’s office. However, when he attempts to log in from Ann’s office, Joe experiences the same issue. Ann asks Joe questions about the new software installed on the laptop from the pop-up notification.  Which of the following are the NEXT steps Joe should take to resolve the issue? (Choose two.)
Ask Ann for her credentials to verify and log on to the vendor’s website from Ann’s laptop 
Check all browser cached files on Ann’s laptop and log on to another vendor’s website 
Attempt to log on to another vendor’s website from Ann’s laptop 
Ask Ann about the notification and review the installed programs 
Ask Ann about the notification and review the installed programs 
Reinstall the browser, reboot the laptop, and check the vendor’s website again 
QUESTION 37 A user’s smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures.  Which of the following steps should be taken FIRST to determine the cause of the issue?
Uninstall the camera application 
Check the application permissions 
Reset the phone to factory settings 
Update all of the applications on the phone 
Run any pending OS updates 
Thomas, an end user, has been prompted to provide his username and password to access the payroll system.  Which of the following authentication methods is being requested? 
Single-factor 
Multifactor 
RADIUS
TACACS 
A junior Linux systems administrator needs to update system software.  Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software?
sudo
chmod
grep 
pwd
A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission.  If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns?
Default SSID 
MAC filtering 
Power levels 
Content filtering 
Firewall
A Windows user is attempting to install a local printer and is unsuccessful based on permissions.  Which of the following user types BEST describes this user? 
Guest 
Power User 
Administrator
Standard User 
A team needs to deploy a temporary server room at a site to provide support during construction.  Which of the following should they use at this site while setting up the server room?
Air filters 
Privacy screens 
Vacuums
ESD mats 
A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring.  Which of the following would BEST accomplish this goal?
Use an antivirus product capable of performing heuristic analysis 
Use a host-based intrusion detection system on each computer 
Disallow the password caching of accounts in the administrators group
Install a UTM in between PC endpoints to monitor for suspicious traffic 
Log all failed login attempts to the PCs and report them to a central server 
A technician is recycling PCs to be reused by a middle school.  Which of the following methods is MOST appropriate for ensuring data has been removed from the PCs?
Standard formatting 
HD drilling 
Low-level formatting 
HD partitioning 
A technician is in the process of upgrading Windows 8 to Windows 10. The technician needs to make sure all of the applications, user profiles, documents, and PST files are preserved.  Which of the following methods would the technician MOST likely perform on the computer?
Unattended installation 
Refresh upgrade 
Clean installation 
In-place upgrade
Which of the following is the MOST secure wireless security protocol?
AES
WPA
WPA2
WEP
Joe, a customer, calls a technician to report a remote computer is demonstrating erratic behavior while he is working on it. The technician verifies the files and directories. Joe is working on locally cannot be opened in any application, and the computer is running extremely slow.  Which of the following is the MOST likely cause of this issue?
Files disappearing 
File permission changes 
Application crash 
Too many startup items
A network administrator needs to be able to securely connect to a local router from within the office.  Which of the following protocols should the administrator ensure is enabled on the router?
RDP
SSH
TFTP
HTTP
A customer purchased a 3TB HDD to use with a Windows 7 PC and wants to have letter “J” assigned only to the drive.  Which of the following types of partitioning should be performed to give the customer full use of the 3 TB drive?
GPT
Dynamic
Basic
Extended
Users notify the help desk of an email that was just received. The email came from the help desk’s email address and asked the users to click on an embedded link.  This email is BEST described as:
phishing. 
zombie. 
whaling. 
spoofing
{"name":"CompTIA A+ Quiz 4 - Professor Glasser", "url":"https://www.quiz-maker.com/QUTVJQEA","txt":"A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom. Which of the following needs to be adjusted on the workstation to fix the issue?, A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server. Which of the following Control Panel utilities should the technician use to configure the setting?, Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time because he has already tried everything that has been suggested. Which of the following should the technician do?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}