Scroll down to see your responses and detailed results
Prepare for the CompTIA A+ 220-1102 exam with our free practice test. Randomly generated and customizable, this test allows you to choose the number of questions.
The security manager at Crucial Technologies wants to help mitigate the possibility of someone being able to access another user’s account by gaining access to the user’s password. What logical security technology should be implemented to satisfy this requirement?
Encryption
MFA
WPA2
Password complexity rules
The answer is MFA. Multi-factor authentication is a logical security method that requires the user to present at least two forms of authentication before being granted access. This is in the form of something the user knows (i.e.password), something they have (i.e. smart card) or something they are (i.e. fingerprint). The other choices are forms of security that would not satisfy the requirement.
Multi-factor authentication (MFA; two-factor authentication, or 2FA, along with similar terms) is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism. MFA protects personal data—which may include personal identification or financial assets—from being accessed by an unauthorized third party that may have been able to discover, for example, a single password. A third-party authenticator (TPA) app enables two-factor authentication, usually by showing a randomly generated and frequently changing code to use for authentication.
Multi-factor_authentication - Wikipedia, the free encyclopediaYou are troubleshooting a service failing to start on a Windows 10 laptop. You have already confirmed the service is configured to start using msconfig
. You suspect the application is crashing after being started, where could you look to find a log of errors or crashes?
logc.sys
This info is also in msconfig
eventvwr.msc
taskmgr.exe
Event Viewer ( or eventvwr.msc
, eventvwr.exe
) is a great place to start when troubleshooting application failures. Applications and components of the Windows itself will log events to Event Viewer so they can be reviewed. This may includes information about the application running like configuration details, warning messages and error messages.
Event Viewer is a component of Microsoft's Windows NT operating system that lets administrators and users view the event logs on a local or remote machine. Applications and operating-system components can use this centralized log service to report events that have taken place, such as a failure to start a component or to complete an action. In Windows Vista, Microsoft overhauled the event system.Due to the Event Viewer's routine reporting of minor start-up and processing errors (which do not, in fact, harm or damage the computer), the software is frequently used by technical support scammers to trick the victim into thinking that their computer contains critical errors requiring immediate technical support. An example is the "Administrative Events" field under "Custom Views" which can have over a thousand errors or warnings logged over a month's time.
Event_Viewer - Wikipedia, the free encyclopediaYou are assisting a user in trying to find a file in their C:\Users folder. You see that some of the folders appear differently than the others, appearing to be faded in, rather than full color. What do these icons refer to?
Cached folders.
Hidden Folders.
Folders currently backing up.
Deleted items still utilizing resources.
Folders that are grey and "ghosted" are hidden folders. These typically hold back-end information or files that the user does not need to access.
In computing, a hidden folder (sometimes hidden directory) or hidden file is a folder or file which filesystem utilities do not display by default when showing a directory listing. They are commonly used for storing user preferences or preserving the state of a utility and are frequently created implicitly by using various utilities. They are not a security mechanism because access is not restricted – usually the intent is simply to not "clutter" the display of the contents of a directory listing with files the user did not directly create.
Hidden_file_and_hidden_directory - Wikipedia, the free encyclopediaAn employee reports that their PC is behaving erratically with frequent popup ads and programs starting automatically, which they suspect is due to malware. You decide to perform a malware scan. Before running your anti-malware software, which step is essential to improve the chances of detection and removal of the malware?
Boot the system into safe mode and then run a complete system scan.
Reboot the system normally and proceed to scan immediately on startup.
Create a new user account with administrative privileges and run the scan from there.
Run a disk cleanup utility before scanning to remove any temporary files created by the malware.
Booting the system into safe mode is the correct answer because it starts the system with a minimal set of drivers and services. Malware often relies on specific services to run, and by booting into safe mode, you may prevent the malware from loading, which allows the anti-malware software to detect and remove it more effectively. Rebooting the system normally or creating a new user account could allow the malware to actively resist removal efforts. Running a disk cleanup utility might assist in removing temporary files that could contain malware, but it does not directly impact the anti-malware software's ability to detect and remove active infections.
In a small office/home office (SOHO) environment, the network administrator is configuring the office wireless router to secure the network against external threats. Which of the following actions would BEST increase the security of the network?
Disabling UPnP on the router
Changing the router's service set identifier (SSID)
Setting up port forwarding/mapping to unspecified services
Disabling SSID broadcast
Disabling Universal Plug and Play (UPnP) on a wireless router can significantly enhance the security of a network. UPnP can be exploited by malware to open ports without a user's knowledge, potentially allowing external threats to penetrate the network. Therefore, disabling it reduces the risks of such vulnerabilities. Changing the SSID does not inherently secure the network—this action just changes the network name. While disabling SSID broadcast may somewhat obscure the network from casual discovery, it is not a robust security measure as SSID can be discovered by more determined attackers using simple tools. Port forwarding/mapping is typically used to allow external devices to access services within the private network and is not a method to enhance network security.
Windows 10 Professional allows users to connect to and manage file servers in a domain environment.
True
False
Windows 10 Professional includes the capability to join a domain, which is necessary for connecting to and managing file servers within a domain environment. This feature is not available in the Windows 10 Home edition.
Where can you find most applications installed on OSX and macOS?
C:\Program Files (x86)
/usr/bin
/Applications
C:\Program Files
/Applications
is the location of most applications installed on Mac OSX and macOS. C:\Program Files\
and C:\Program Files (x86)\
are similar folders on Windows OS editions. Linux operating systems can greatly vary, but on many you can find many applications at /usr/bin
.
What is the command-line tool that will display a list of a directory's files and subdirectories on Microsoft Windows?
dir
The dir command displays a list of a directory's files and subdirectories. If used without parameters.
In computing, dir (directory) is a command in various computer operating systems used for computer file and directory listing. It is one of the basic commands to help navigate the file system. The command is usually implemented as an internal command in the command-line interpreter (shell). On some systems, a more graphical representation of the directory structure can be displayed using the tree command.
Dir_(command) - Wikipedia, the free encyclopediaWhat Windows command allows users to shutdown a local or remote computer?
shutdown
Shutdown is a Windows command-tool that enables users to initiate the shutdown or restart of a computer, offering additional options such as specifying a time delay, displaying a custom message to users, or providing a reason for the shutdown. This command provides flexibility and control over the shutdown process for effective system management.
What is the 4th step of the seven-step malware removal process?
Enable System Restore and create a restore point (if Windows OS)
Quarantine the infected system
Remediate the infected systems
Update the Operating System and primary applications
The 7 steps of the malware removal process are:
A technician needs to provide assistance to a remote client who is not very technologically savvy. The client requires a software installation and some configuration changes. Which remote access technology would BEST suit this scenario, ensuring ease of use for the client and allowing the technician to perform the necessary tasks?
Secure Shell (SSH)
Virtual Private Network (VPN)
Virtual Network Computer (VNC)
Microsoft Remote Assistance (MSRA)
Using Microsoft Remote Assistance (MSRA), the technician can request to control the client's computer with the client's permission and demonstrate the proper installation and configuration process. The client will only need to accept the invitation, making it straightforward for users without extensive technical knowledge. Other options, like VPNs and SSH, require more client involvement and knowledge, and are therefore not the best fit for this scenario.
A company has multiple branches across different time zones. An upcoming critical system update requires simultaneous execution to maintain data integrity. What is the BEST approach to determine the date and time for this update to minimize business impact?
Identify a time window where all branches are in their off-peak hours, accommodating every location's low-activity period despite the time zone differences.
Schedule the update based on when individual branches report the least amount of user activity, even if this means updates occur at different local times.
Determine a time when the majority, but not necessarily all, branches experience low activity, accepting potential minor disruptions.
Schedule the update during the headquarter's non-business hours, which takes precedence over other locations.
When managing updates across multiple time zones, one must consider the peak business hours for all locations to choose a time when system usage is lowest. The ideal approach would be to select a time when all branches are least active, like during the night or on weekends, depending on the nature of the company's operations. This minimizes impact on business continuity and reduces the likelihood of affecting productivity across the branches. Avoiding local business hours for any specific branch prevents the misconception that it is a suitable time frame for a global update.
Which Windows command tool is used for copying files and directories with advanced options like preserving file attributes, copying subdirectories, and allowing for the copying of files only if they are newer than the destination files?
xcopy
XCopy is a a Windows command tool that is utilized for copying files and directories.
Unlike the simpler "copy" command, "xcopy" offers advanced options such as the ability to preserve file attributes, copy subdirectories, and selectively copy files only if they are newer than their counterparts in the destination. This makes "xcopy" a more versatile and feature-rich tool for efficient file management and backup operations in comparison to the basic "copy" command.
A healthcare clinic uses IoT wearables to monitor patients' vital signs remotely. The IT department is tasked with ensuring the security of patient data collected by these devices. Which of the following actions is MOST effective in preventing unauthorized access to the stored health data on these IoT wearables?
Regularly change the Wi-Fi password of the network the wearables connect to.
Encrypt the data on the wearables.
Disable unnecessary services and features on the IoT devices.
Implement a firewall on the network to which the wearables connect.
Encrypting data on the devices is the most effective measure to protect the stored information because it ensures that even if the device is lost or stolen, the patient data remains inaccessible without the appropriate decryption key. Regularly changing Wi-Fi passwords, while a good security practice, does not directly protect the data on the devices themselves. Implementing a firewall protects against network-based attacks but would not prevent access to data if the device is compromised. Disabling unnecessary services reduces the attack surface but would not protect the data that is already on the device.
Which type of regulated data includes information such as diagnoses, treatments, and billing information related to an individual's health and medical records?
Credit card transactions
Personal government-issued information
PII
Healthcare data
Healthcare data pertains to an individual’s health information, including anything from diagnoses and treatment records to billing details. It is protected under laws such as HIPAA in the United States, which sets the standard for the protection of sensitive patient data. Companies dealing with healthcare data must implement safeguards to ensure the privacy and security of this information.
Looks like thats it! You can go back and review your answers or click the button below to grade your test.