Topic 2: Exam Pool B
A user is unable to access a website, which is widely used across the organization, and receives the following error message: The security certificate presented by this website has expired or is not yet valid. The technician confirms the website works when accessing it from another computer but not from the user's computer. Which of the following should the technician perform NEXT to troubleshoot the issue?
A. Reboot the computer
B. Reinstall the OS.
C. Configure a static 12
D. Check the computer's date and time.
Explanation:
The error message indicates that the security certificate presented by the website has
either expired or is not yet valid. This can happen if the computer's clock has the wrong
date or time, as SSL/TLS certificates have a specific validity period. If the clock is off by too
much, it may cause the certificate to fail to validate. Therefore, the technician should check
the computer's date and time and ensure that they are correct.
A user is trying to limit the amount of time their children spend on the internet. Which of the following Windows 10 settings should be enabled to accomplish this objective?
A. Family Options
B. Update & Security
C. Ease of Access
D. Network & Internet
E. Privacy
Explanation:
Windows 10 includes a set of parental controls within the "Family Options" section of the
Windows settings. This feature allows parents to manage their children's computing
activities, including setting time limits on device use, filtering web content, managing
privacy and online safety settings, and viewing activity reports.
Family Options: By enabling and configuring Family Options, the user can set
specific times when their children can use the device and access the internet,
effectively limiting their overall screen time and internet usage.
Update & Security (B) mainly deals with Windows updates and security features but does
not directly provide settings for time management. Ease of Access (C) is focused on
accessibility settings and does not include time management options. Network & Internet
(D) settings control network connectivity and do not offer parental controls or time limits.
Privacy (E) settings manage which applications can access device features and user data
but do not include time management options.
A technician is troubleshooting a lack of outgoing audio on a third-party Windows 10 VoIP application, The PC uses a USB microphone connected to a powered hub. The technician verifies the microphone works on the PC using Voice Recorder. Which of the following should the technician do to solve the issue?
A. Remove the microphone from the USB hub and plug it directly into a USB port on the PC.
B. Enable the microphone under Windows Privacy settings to allow desktop applications to access it.
C. Delete the microphone from Device Manager and scan for new hardware,
D. Replace the USB microphone with one that uses a traditional 3.5mm plug.
Explanation:
In Windows 10, there are privacy settings that control access to certain devices, such as
microphones, cameras, and other input devices. If the microphone is not enabled under
these privacy settings, the VoIP application may not have access to it, causing a lack of
outgoing audio.
The technician can go to the Windows 10 Settings menu, select the Privacy submenu, and
under App permissions, select Microphone. The technician should then turn on the toggle
switch for the VoIP application to allow it to access the microphone.
Removing the microphone from the USB hub and plugging it directly into a USB port on the
PC may or may not solve the issue, as the issue could be related to the privacy settings.
Deleting the microphone from Device Manager and scanning for new hardware may also
not solve the issue, as the issue could be related to the privacy settings. Replacing the
USB microphone with one that uses a traditional 3.5mm plug is not recommended, as it
would require purchasing a new microphone and may not solve the issue.
A company installed WAPs and deployed new laptops and docking stations to all employees. The docking stations are connected via LAN cables. Users are now reporting degraded network service. The IT department has determined that the WAP mesh network is experiencing a higher than anticipated amount of traffic. Which of the following would be the most efficient way to ensure the wireless network can support the expected number of wireless users?
A. Replacing non-mobile users' laptops with wired desktop systems
B. Increasing the wireless network adapter metric
C. Adding wireless repeaters throughout the building
D. Upgrading the current mesh network to support the 802.11 n specification
Explanation:
When a WAP (Wireless Access Point) mesh network is experiencing a higher than
anticipated amount of traffic, leading to degraded network service, upgrading the network
to a more advanced wireless standard can help alleviate the problem. The 802.11n
specification, also known as Wireless-N, offers significant improvements over earlier
standards like 802.11b/g in terms of speed, range, and reliability. It allows for increased
data throughput and better coverage, which can support a higher number of wireless users
effectively.
Upgrading to 802.11n: This involves replacing existing WAPs with those that
support the 802.11n standard or higher. The upgrade can result in improved
network performance by accommodating more wireless connections with higher
data rates, reducing congestion and improving overall network efficiency.
Replacing non-mobile users' laptops with wired desktop systems (A) could reduce wireless
traffic but may not be feasible or desirable for all users. Increasing the wireless network
adapter metric (B) would affect route priority but not overall network capacity. Adding
wireless repeaters (C) can extend the range but might also introduce additional latency and
does not necessarily increase the network's capacity to handle more users efficiently.
A user reports a PC is running slowly. The technician suspects high disk I/O. Which of the following should the technician perform NEXT?
A. resmon_exe
B. dfrgui_exe
C. msinf032exe
D. msconfig_exe
Explanation:
If a technician suspects high disk I/O, the technician should use the Resource Monitor
(resmon.exe) to identify the process that is causing the high disk I/O1. Resource Monitor
provides detailed information about the system’s resource usage, including disk I/O1. The
technician can use this information to identify the process that is causing the high disk I/O
and take appropriate action1.
Which of the following operating systems was the app file type designed to run under as an application file bundle?
A. macOS
B. Chrome
C. Windows
D. Linux
Explanation: The app file type is designed to run under macOS as an application file bundle. macOS uses application bundles to store executable files and related resources, such as libraries, image files, and localized content, in a single directory hierarchy. This approach simplifies application management and execution within the macOS environment.
A Windows user reported that a pop-up indicated a security issue. During inspection, an antivirus system identified malware from a recent download, but it was unable to remove the malware. Which of the following actions would be BEST to remove the malware while also preserving the user's files?
A. Run the virus scanner in an administrative mode
B. Reinstall the operating system
C. Reboot the system in safe mode and rescan.
D. Manually delete the infected files
Explanation:
Rebooting the system in safe mode will limit the number of programs and processes
running, allowing the antivirus system to more effectively identify and remove the malware.
Rescanning the system will allow the antivirus system to identify and remove the malware
while preserving the user's files.
Each time a user tries to go to the selected web search provider, a different website opens. Which of the following should the technician check FIRST?
A. System time
B. IP address
C. DNS servers
D. Windows updates
Explanation:
When a user experiences unexpected or erratic behavior while browsing the internet, it
could be caused by the DNS servers. DNS translates human-readable domain names (like
google.com) into IP addresses, which computers can use to communicate with web
servers. If the DNS servers are not functioning correctly or have been compromised, it can
result in the browser being redirected to unintended websites.
A technician connects an additional monitor to a PC using a USB port. The original HDMI monitor is mounted to the left of the new monitor. When moving the mouse to the right from the original monitor to the new monitor, the mouse stops at the end of the screen on the original monitor. Which of the following will allow the mouse to correctly move to the new monitor?
A. Rearranging the monitor's position in display settings
B. Swapping the cables for the monitors
C. Using the Ctrl+AIt+> to correct the display orientation
D. Updating the display drivers for the video card
Explanation:
The correct answer is B. Swapping the cables for the monitors. When the second monitor
is connected with the HDMI port, it is necessary to swap the cables for the monitors so that
the mouse can move from the original monitor to the new monitor. This is because the
HDMI port is designed to only support one monitor, and the mouse will not be able to move
from one to the other without the cables being swapped.
According to CompTIA A+ Core 2 documents, "When connecting multiple displays to a
system, the cables used to connect the displays must be swapped between the displays.
For example, if a monitor is connected to a system using a VGA cable, the VGA cable must
be moved to the next display to allow the mouse to move between the two displays."
A user in a corporate office reports the inability to connect to any network drives. No other users have reported this issue. Which of the following is the MOST likely reason the user is having this issue?
A. The user is not connected to the VPN.
B. The file server is offline
C. A low battery is preventing the connection
D. The log-in script failed.
A developer is creating a shell script to automate basic tasks in Linux. Which of the following file types are supported by default?
A. .py
B. .js
C. .vbs
D. .sh
Which of the following should be used to control security settings on an Android phone in a domain environment?
A. MDM
B. MFA
C. ACL
D. SMS
Explanation:
The best answer to control security settings on an Android phone in a domain environment
is to use “Mobile Device Management (MDM)”. MDM is a type of software that is used to
manage and secure mobile devices such as smartphones and tablets. MDM can be used
to enforce security policies, configure settings, and remotely wipe data from devices. In a
domain environment, MDM can be used to manage Android phones and enforce security
policies such as password requirements, encryption, and remote wipe capabilities12.
Page 26 out of 62 Pages |
Previous |