The CompTIA 220-901 exam is one of two exams requires to obtain the CompTIA A+ (900 series). This exam will cover operating systems like Windows, Macintosh OSX and Linux as well as topics like security, software troubleshooting and operational procedures.
Unfortunately the FAT32 file system does not allow for file and folder permissions like those that are commonly found on modern file systems, such as NTFS.
This question is filed under objective 3, Security
GRUB (GRand Unified Bootloader) is an open source technology commonly used to allow multiple operating systems to boot on a single machine. GRUB is commonly used as the default boot loader for Linux, but it is compatible with Windows also. When Windows 10 was installed the GRUB was replaced or corrupted and using the Linux installation CD to restore it is your best option.
This question is filed under objective 4, Software Troubleshooting
Windows 10 and Windows 7 were released 6 years apart. It is possible her laptop does not meet the minimum requirements for Windows 10 and the laptop's specs should be verified first.
This question is filed under objective 1, Windows Operating Systems
Safe Mode, as it's name implies, can allow a Windows OS to safely BOOT even when a malicious software, invalid driver, or other issue is causing a system failure.
This question is filed under objective 4, Software Troubleshooting
The trouble shooting theory is as follows: 1. Identify the problem, 2. Establish a theory of probable cause, 3. Test the theory to determine cause, 4. Establish a plan of action to resolve the problem and implement the solution, 5. Verify full system functionality and if applicable implement preventive measures, 6. Document findings, actions and outcomes
This question is filed under objective 5, Operational Procedures
There's no firewall or antivirus that can protect from Social Engineering. The best solution is to teach users how to identify and avoid Social Engineering.
This question is filed under objective 3, Security
Check Disk (CHKDSK) is a Windows Repair tool for verifying volume integrity.
This question is filed under objective 4, Software Troubleshooting
IWCONFIG is a Linux command line tool for configuring wireless settings. IWCONFIG can be used to change settings like authorized access points, signal strength, wireless channel, and what SSID to connect to. IP Address, subnet mask and DNS servers are still configured via IFCONFIG.
This question is filed under objective 2, Other Operating Systems & Technologies
Inheritance is when an computer object, like a file or folder inherits settings from it's parent. For example, if a user does not have read access to a folder, they also cannot read any files or sub folders of that directory.
This question is filed under objective 3, Security
Open Source software is a software application whose code is publicly available for review, modification and enhancement.
This question is filed under objective 2, Other Operating Systems & Technologies
The MSCONFIG tool, officially called the System Configuration tool has several features for troubleshooting and modifying the start up process.
This question is filed under objective 4, Software Troubleshooting
Ipconfig is a Windows command line tool that provides network information like the IP Address, MAC Address, and Subnet Mask.
This question is filed under objective 1, Windows Operating Systems
In this situation you need to ensure proper Chain of Custody. Chain of Custody is a record of evidence's ownership. Anyone who has had control of the evidence should be recorded to include when and where they had it. The Chain of Custody can be used as a legal document to proof no one has altered or deleted data since discovered.
This question is filed under objective 5, Operational Procedures
Placing sudo (SuperUser Do) in front of a command in some Linux environments will run the command with the security privileges of the root account. Once the command finishes the privileges will be removed and are not applied to any further commands or applications. (unless they are also run with sudo)
This question is filed under objective 2, Other Operating Systems & Technologies
When accessing through a network share both NTFS and share permissions will apply. When accessing a file or folder directly only NTFS permissions will apply. In either case the principle of least privilege will apply and the most restrictive permissions will always take priority.
This question is filed under objective 3, Security
Many RAID cards require a vendor specific driver to function with Windows. In order to install Windows, you first need to provide it with the proper RAID driver.
This question is filed under objective 4, Software Troubleshooting
Changing the account password will most likely solve the issue, but better preventatives should be put in place as soon as possible. Spam filters typically ignore local emails, which is why this is not the correct answer.
This question is filed under objective 3, Security
Performance monitor is a Windows tool that can be used to monitor and log a system's health and status in real time. Task Manager can display similar information but does not log and should only be used as a quick reference.
This question is filed under objective 1, Windows Operating Systems
A Dictionary Attack uses a list of preset words, phrases and commonly used passwords.
This question is filed under objective 3, Security
You can go back and review your answers or grade your test.