Topic 5: Exam Pool E
Which of the following environments allows for the testing of critical systems without the risk of them being negatively impacted by changes?
A. Regression
B. Cloud
C. Production
D. Sandbox
A user recently purchased a second monitor and wants to extend the Windows desktop to the new screen. Which of the following Control Panel options should a technician adjust to help the user? Color Management
A. System
B. Troubleshooting
C. Device Manager
D. Administrative Tools
A technician needs to formal a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use?
A. FAT32
B. ext4
C. NTFS
D. exFAT
Explanation:
Since Windows systems support FAT32 and NTFS "out of the box" and Linux supports a
whole range of them including FAT32 and NTFS, it is highly recommended to format the
partition or disk you want to share in either FAT32 or NTFS, but since FAT32 has a file size
limit of 4.2 GB, if you happen to work with huge files, then it is better you use NTFS.
A technician needs administrator access on a Windows workstation to facilitate system changes without elevating permissions. Which of the following would best accomplish this task?
A. Group Policy Editor
B. Local Users and Groups
C. Device Manager
D. System Configuration
Explanation: Local Users and Groups is the best option to accomplish this task. Local Users and Groups is a tool that allows managing the local user accounts and groups on a Windows workstation. The technician can use this tool to create a new user account with administrator privileges or add an existing user account to the Administrators group. This way, the technician can log in with the administrator account and make system changes without elevating permissions. Group Policy Editor, Device Manager, and System Configuration are not correct answers for this question. Group Policy Editor is a tool that allows configuring policies and settings for users and computers in a domain environment. Device Manager is a tool that allows managing the hardware devices and drivers on a Windows workstation. System Configuration is a tool that allows modifying the startup options and services on a Windows workstation. None of these tools can directly grant administrator access to a user account.
A technician needs to transfer a large number of files over an unreliable connection. The technician should be able to resume the process if the connection is interrupted. Which of the following tools can be used?
A. afc
B. ehkdsk
C. git clone
D. zobocopy
Explanation:
The technician should use afc to transfer a large number of files over an unreliable
connection and be able to resume the process if the connection is interrupted.
Which of the following does MFA provide?
A. Security enhancement
B. Encryption
C. Digital signature
D. Public key infrastructure
Explanation: MFA stands for multi-factor authentication, which is an electronic authentication method that requires the user to provide two or more verification factors to gain access to a resource such as an application, online account, or a VPN1. MFA provides security enhancement by making it harder for attackers to compromise the user’s identity or credentials, as they would need to obtain more than just the username and password. MFA can also prevent unauthorized access to sensitive data or resources, as well as reduce the risk of identity theft or fraud2.
A user is configuring a new SOHO Wi-Fi router for the first time. Which of the following settings should the user change FIRST?
A. Encryption
B. Wi-Fi channel
C. Default passwords
D. Service set identifier
Explanation:
the user should change the default passwords first when configuring a new SOHO Wi-Fi
router.
Which of the following is the best way to limit the loss of confidential data if an employee's company smartphone is lost or stolen?
A. Installing a VPN
B. Implementing location tracking
C. Configuring remote wipe
D. Enabling backups
Explanation: Configuring remote wipe allows the device owner or administrator to erase all the data on the device remotely, in case it is lost or stolen. This prevents unauthorized access to confidential data and reduces the risk of data breaches. Installing a VPN, implementing location tracking, and enabling backups are useful features, but they do not directly limit the loss of data if the device is compromised. References: CompTIA A+ Certification Exam Core 2 Objectives, Domain 2.0: Security, Objective 2.5: Given a scenario, use methods to secure mobile devices.
A technician is troubleshooting an issue involving programs on a Windows 10 machine that are loading on startup but causing excessive boot times. Which of the following should the technician do to selectively prevent programs from loading?
A. Right-click the Windows button, then select Run entering shell startup and clicking OK, and then move items one by one to the Recycle Bin
B. Remark out entries listed HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>Windows>CurrentVersion>Run
C. Manually disable all startup tasks currently listed as enabled and reboot checking for issue resolution at startup
D. Open the Startup tab and methodically disable items currently listed as enabled and reboot, checking for issue resolution at each startup.
Explanation:
This is the most effective way to selectively prevent programs from loading on a Windows
10 machine. The Startup tab can be accessed by opening Task Manager and then
selecting the Startup tab. From there, the technician can methodically disable items that
are currently listed as enabled, reboot the machine, and check for issue resolution at each startup. If the issue persists, the technician can then move on to disabling the next item on
the list.
A network technician is deploying a new machine in a small branch office that does not have a DHCP server. The new machine automatically receives the IP address of 169.254.0.2 and is unable to communicate with the rest of the network. Which of the following would restore communication? Static entry
A. ARP table
B. APIPA address
C. NTP specification
Explanation:
A static entry is the best option to restore communication for the new machine in a small branch office that does not have a DHCP server. A static entry means manually configuring the IP address, subnet mask, default gateway, and DNS server for the network adapter of the machine. A static entry ensures that the machine has a valid and unique IP address that matches the network configuration and can communicate with the rest of the network. The new machine automatically receives the IP address of 169.254.0.2 because it uses APIPA (Automatic Private IP Addressing), which is a feature that enables computers to
self-assign an IP address when a DHCP server is not available. However, APIPA only works for local communication within the same subnet, and does not provide a default gateway or a DNS server. Therefore, the new machine is unable to communicate with the rest of the network, which may be on a different subnet or require a gateway or a DNS server to access.
The other options are not related to restoring communication for the new machine. ARP table is a cache that stores the mapping between IP addresses and MAC addresses for the devices on the network. NTP specification is a protocol that synchronizes the clocks of the devices on the network.
Page 6 out of 74 Pages |
Previous |