Topic 6, Exam Pool F
A user recently downloaded a free game application on an Android device. The device then began crashing frequently and quickly losing its battery charge. Which of the following should the technician recommend be done first to remediate these issues? (Select two).
A. Uninstall the game application.
B. Perform a factory reset of the device.
C. Connect the device to an external charger.
D. Install the latest security patches.
E. Clear the application's cache.
F. Enable the device's built-in anti-malware protection.
A technician is troubleshooting a user’s PC that is running slowly and displaying frequent pop-ups. The technician thinks malware may be causing the issues, but before the issues began the user installed anti-malware software in response to a pop-up window Which of the following is the most likely cause of these issues'?
A. Expired certificate
B. False alert
C. Missing system files
D. OS update failure
Explanation: The scenario described is characteristic of a malware tactic known as scareware, where users are tricked into installing malware through false alerts claiming that their system is infected. The anti-malware software installed in response to a pop-up is likely malicious, causing the system to run slowly and display frequent pop-ups.
A technician is troubleshooting a computer with a suspected short in the power supply. Which of the following is the FIRST step the technician should take?
A. Put on an ESD strap
B. Disconnect the power before servicing the PC.
C. Place the PC on a grounded workbench
D. Place components on an ESD mat.
Explanation:
The first step a technician should take when troubleshooting a computer with a suspected
short in the power supply is B. Disconnect the power before servicing the PC. This is to
prevent any electrical shock or damage to the components. A power supply can be
dangerous even when unplugged, as capacitors can maintain a line voltage charge for a long time1. Therefore, it is important to disconnect the power cord and press the power
button to discharge any residual power before opening the case2. The other steps are also
important for safety and proper diagnosis, but they should be done after disconnecting the
power.
A technician wants to harden Windows workstations after a recent security audit indicated the company is vulnerable to brute-force attacks. Which of the following features should the technician implement to mitigate such attacks?
A. System screen lock
B. Failed log-in lockout
C. Restricted user permissions
D. Data-at-rest encryption
Explanation: To mitigate brute-force attacks, implementing a failed log-in lockout feature is effective. This security measure temporarily disables user accounts after a specified number of unsuccessful login attempts, preventing attackers from continuously trying different password combinations to gain unauthorized access.
A systems administrator needs to reset a users password because the user forgot it. The systems administrator creates the new password and wants to further protect the user's account Which of the following should the systems administrator do?
A. Require the user to change the password at the next log-in.
B. Disallow tie user from changing the password.
C. Disable the account
D. Choose a password that never expires
Explanation:
This will ensure that the user is the only one who knows their password, and that the new
password is secure.
The CompTIA A+ Core 2 220-1002 exam covers this topic in the domain 1.4 Given a
scenario, use appropriate data destruction and disposal methods.
An employee has been using the same password for multiple applications and websites for the past several years. Which of the following would be best to prevent security issues?
A. Configuring firewall settings
B. Implementing expiration policies
C. Defining complexity requirements
D. Updating antivirus definitions
Explanation: To prevent security issues related to an employee using the same password for multiple applications and websites, implementing expiration policies (B) is best. Password expiration policies require users to change their passwords at regular intervals, which helps to mitigate the risks associated with password reuse. Regularly changing passwords reduces the chances of unauthorized access from compromised credentials.
A user's computer is running slower than usual and takes a long time to start up. Which of the following tools should the technician use first to investigate the issue?
A. Action Center
B. Task Manager
C. Resource Monitor
D. Security Configuration Wizard
E. Event Viewer
Explanation: When a computer is running slower than usual and experiences long startup times, the first tool to use is: Task Manager: This utility provides real-time data on the processes and applications consuming system resources like CPU, memory, and disk usage. By identifying resource-heavy processes, a technician can take steps to optimize performance or identify malicious software.
A bank would like to enhance building security in order to prevent vehicles from driving into the building while also maintaining easy access for customers. Which of the following BEST addresses this need?
A. Guards
B. Bollards
C. Motion sensors
D. Access control vestibule
Explanation:
Bollards are the best solution to enhance building security in order to prevent vehicles from
driving into the building while also maintaining easy access for customers4.
References: 2. Bollards. Retrieved from https://en.wikipedia.org/wiki/Bollard
A technician is setting up a new PC in a SOHO. Which of the following should the technician most likely configure on the PC?
A. VDI
B. Mapped drives
C. Wireless WAN
D. Domain
Explanation: In a Small Office/Home Office (SOHO) setup, the technician is most likely to configure mapped drives on a new PC. Mapped drives allow for easy access to shared resources such as files and printers on the network. This setup facilitates file sharing and collaboration within a small network, making it an essential configuration for SOHO environments.
A technician has an external SSD. The technician needs to read and write to an external SSD on both Macs and Windows PCs. Which of the following filesystems is supported by both OS types?
A. NTFS
B. APFS
C. ext4
D. exFAT
Explanation:
The filesystem that is supported by both Macs and Windows PCs is D. exFAT. exFAT is a
file system that is designed to be used on flash drives like USB sticks and SD cards. It is
supported by both Macs and Windows PCs, and it can handle large files and volumes.
https://www.diskpart.com/articles/file-system-for-mac-and-windows-0310.html
A user's Windows desktop has low disk space. A technician thinks some upgrade files were never removed. Which of the following tools should the technician use to correct the issue?
A. devmgmt.msc
B. cleanmgr.exe
C. dfrgui.exe
D. diskmgmt.mac
Explanation: The correct tool to use for removing upgrade files and freeing up disk space on a Windows desktop is cleanmgr.exe, which stands for Disk Cleanup. Disk Cleanup is a maintenance utility included in Microsoft Windows designed to free up disk space on a computer's hard drive. The utility scans and analyzes the hard drive for files that are no longer of any use, and then removes the unnecessary files. It can delete temporary files, system files, empty the Recycle Bin, and remove a variety of system files and other items that you might no longer need.
A user reports a workstation has been performing strangely after a suspicious email was opened on it earlier in the week. Which of the following should the technician perform FIRST?
A. Escalate the ticket to Tier 2.
B. Run a virus scan.
C. Utilize a Windows restore point
D. Reimage the computer.
Explanation:
https://partners.comptia.org/docs/default-source/resources/comptia-a-220-1102-examobjectives-(
3-0)
When a user reports that their workstation is behaving strangely after opening a suspicious
email, the first step a technician should take is to run a virus scan on the computer. This is
because opening a suspicious email is a common way for viruses and malware to infect a
computer. Running a virus scan can help identify and remove any infections that may be
causing the computer to behave strangely.
Page 28 out of 62 Pages |
Previous |