CompTIA A+ Quiz 4 - Professor Glasser

A visually engaging illustration depicting elements of computer technology and IT certification, including laptops, servers, network icons, and a person studying with a notebook.

CompTIA A+ Certification Quiz

Test your knowledge with this comprehensive CompTIA A+ Certification Quiz designed for aspiring IT professionals. Covering key concepts and troubleshooting scenarios, this quiz will help you prepare for the certification exam and enhance your understanding of computer technology.

Featuring:

  • 30 carefully crafted questions
  • Diverse topics in IT support and network management
  • Immediate feedback on your answers
30 Questions8 MinutesCreated by TypingTiger123
A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom. Which of the following needs to be adjusted on the workstation to fix the issue?
Date and time
UEFI boot mode
Logon times
User access control
A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server. Which of the following Control Panel utilities should the technician use to configure the setting?
Internet Options – Advanced
Internet Options – Connections
Internet Options – Security
Internet Options – Content
Internet Options – Privacy
Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time because he has already tried everything that has been suggested. Which of the following should the technician do?
Since Joe is concerned about time, suggest calling back later when Joe has more time to troubleshoot
Record the call and send it to the local intranet for future technicians to learn how to deal with calls like this one
Ask more open-ended questions to see if the issue can be narrowed down in order to properly identify the issue and save time
Inform the customer that there is a troubleshooting script that must be followed to get the issue resolved
A SOHO customer has recently experienced a major hurricane. The customer has no backups and has lost all data and hardware associated with the company. The customer calls a contractor to assist in the rebuilding process and needs suggestions on the best way to prevent this from happening again. Which of the following recommendations should the contractor give to the customer? (Choose two.)
Backup testing
Cloud storage
Local storage backups
Data recovery
Hot site
Waterproof devices
A technician has identified malware on a user’s system. Which of the following should the technician do NEXT according to malware removal best practices?
Enable System Restore and create a restore point so no data is lost
Educate the user about how to avoid malware in the future
Update the antivirus software and run a full system scan
Move the infected system to a lab with no network connectivity
A user’s Windows laptop has become consistently slower over time. The technician checks the CPU utilization and sees that it varies between 95% and 100%. After the technician closes some running applications, the CPU utilization drops to approximately 20%, and the laptop runs much faster. The next day the same user calls again with the same problem. Which of the following is a tool the technician can use to resolve the issue?
Task Manager
MSTSC
MSConfig
PerfMon
A manager requests remote access to a server after hours and on weekends to check data. The manager insists on using the server. Before granting the access, which of the following is the MOST important step a technician can take to protect against possible infection?
Create a policy to remove Internet access from the server during off hours
Set the local antivirus software on the server to update and scan daily
Ensure the server is patched with the latest security updates
Educate the manager on safe Internet browsing practices
A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately. With which of the following types of infections are the PCs MOST likely infected? (Choose two.)
Spyware
Zombies
Virus
Ransomware
Worm
Botnet
Ann, a user, is attempting to log in to her email service form a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid. Ann then decides to reset her email password, but after the reset, the new credentials still do not work in the third-party email client. Which of the following settings or features is responsible for the problems Ann is experiencing?
Full device encryption
Account lock
Multifactor authentication
Strong password requirements
In which of the following file extension types would a user expect to see the command. “net use T:\\server\files”?
.bat
.vbs
.js
.py
A user contacts a technician to troubleshoot server errors. The user explains that some files will not open on the server, the data backups are operational, and the weather has been bad. The technician notices missing time slots in the event log. Which of the following should the technician replace to prevent these issues in the future?
System memory
Surge protector
Hard drives
Battery backup
Ann, a user, calls the help desk regarding an issue on her laptop. While working remotely, she appears to be connecting to WiFi but is unable to retrieve her corporate email. The wireless name is listed as “ConnectMe” and appears as unsecure. Which of the following should the help desk perform to fix the issue?
Remote into Ann’s system and restart the wireless adapter
Ask Ann to open a browser and watch for a redirect page
Advice Ann to plug an Ethernet cable into her laptop
Direct Ann to run an antivirus program on her laptop
A project team is organized to implement a new wireless solution for a school. The team has already done the network diagrams and knows the locations that will need to be addressed in the project. The team is in the process of creating an SOW for the project as a whole and needs to add the critical pieces to the SOW to complete it and move to the next stage. Which of the following would the project team MOST likely add to the SOW?
Risk analysis
Plan to change
Backout plan
Change board approvals
A user calls the help desk regarding a new Windows issue that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem. Which of the following would MOST likely fix the issue?
Roll back updates
Disable the Windows Update service
Check for updates
Restore hidden updates
A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources. Which of the following protocols and authentication methods should the technician implement? (Choose two.)
WPA
WPA2
WEP
TKIP
RADIUS
Multifactor
TACACS
SSO
Ann, an employee at a company, calls the help desk to report issues logging on to a vendor’s website. Joe, the technician, is able to log in successfully with his credentials before going to Ann’s office. However, when he attempts to log in from Ann’s office, Joe experiences the same issue. Ann asks Joe questions about the new software installed on the laptop from the pop-up notification. Which of the following are the NEXT steps Joe should take to resolve the issue? (Choose two.)
Ask Ann for her credentials to verify and log on to the vendor’s website from Ann’s laptop
Check all browser cached files on Ann’s laptop and log on to another vendor’s website
Attempt to log on to another vendor’s website from Ann’s laptop
Ask Ann about the notification and review the installed programs
Ask Ann about the notification and review the installed programs
Reinstall the browser, reboot the laptop, and check the vendor’s website again
QUESTION 37 A user’s smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures. Which of the following steps should be taken FIRST to determine the cause of the issue?
Uninstall the camera application
Check the application permissions
Reset the phone to factory settings
Update all of the applications on the phone
Run any pending OS updates
Thomas, an end user, has been prompted to provide his username and password to access the payroll system. Which of the following authentication methods is being requested?
Single-factor
Multifactor
RADIUS
TACACS
A junior Linux systems administrator needs to update system software. Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software?
Sudo
Chmod
Grep
Pwd
A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission. If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns?
Default SSID
MAC filtering
Power levels
Content filtering
Firewall
A Windows user is attempting to install a local printer and is unsuccessful based on permissions. Which of the following user types BEST describes this user?
Guest
Power User
Administrator
Standard User
A team needs to deploy a temporary server room at a site to provide support during construction. Which of the following should they use at this site while setting up the server room?
Air filters
Privacy screens
Vacuums
ESD mats
A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring. Which of the following would BEST accomplish this goal?
Use an antivirus product capable of performing heuristic analysis
Use a host-based intrusion detection system on each computer
Disallow the password caching of accounts in the administrators group
Install a UTM in between PC endpoints to monitor for suspicious traffic
Log all failed login attempts to the PCs and report them to a central server
A technician is recycling PCs to be reused by a middle school. Which of the following methods is MOST appropriate for ensuring data has been removed from the PCs?
Standard formatting
HD drilling
Low-level formatting
HD partitioning
A technician is in the process of upgrading Windows 8 to Windows 10. The technician needs to make sure all of the applications, user profiles, documents, and PST files are preserved. Which of the following methods would the technician MOST likely perform on the computer?
Unattended installation
Refresh upgrade
Clean installation
In-place upgrade
Which of the following is the MOST secure wireless security protocol?
AES
WPA
WPA2
WEP
Joe, a customer, calls a technician to report a remote computer is demonstrating erratic behavior while he is working on it. The technician verifies the files and directories. Joe is working on locally cannot be opened in any application, and the computer is running extremely slow. Which of the following is the MOST likely cause of this issue?
Files disappearing
File permission changes
Application crash
Too many startup items
A network administrator needs to be able to securely connect to a local router from within the office. Which of the following protocols should the administrator ensure is enabled on the router?
RDP
SSH
TFTP
HTTP
A customer purchased a 3TB HDD to use with a Windows 7 PC and wants to have letter “J” assigned only to the drive. Which of the following types of partitioning should be performed to give the customer full use of the 3 TB drive?
GPT
Dynamic
Basic
Extended
Users notify the help desk of an email that was just received. The email came from the help desk’s email address and asked the users to click on an embedded link. This email is BEST described as:
Phishing.
Zombie.
Whaling.
Spoofing
{"name":"CompTIA A+ Quiz 4 - Professor Glasser", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge with this comprehensive CompTIA A+ Certification Quiz designed for aspiring IT professionals. Covering key concepts and troubleshooting scenarios, this quiz will help you prepare for the certification exam and enhance your understanding of computer technology.Featuring:30 carefully crafted questionsDiverse topics in IT support and network managementImmediate feedback on your answers","img":"https:/images/course8.png"}
Powered by: Quiz Maker