100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CompTia A+ Test (1002) Skillsoft 100% Correct Answers Verified Latest 2024 Version $8.99   Add to cart

Exam (elaborations)

CompTia A+ Test (1002) Skillsoft 100% Correct Answers Verified Latest 2024 Version

 2 views  0 purchase
  • Course
  • Institution

CompTia A+ Test (1002) Skillsoft | 100% Correct Answers | Verified | Latest 2024 Version You have opened File Explorer and are in the c:PLAB directory. You want to open the command prompt and navigate to the same directory. You need to do this with minimum administrative effort. What should you...

[Show more]

Preview 4 out of 39  pages

  • June 17, 2024
  • 39
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
avatar-seller
CompTia A+ Test (1002) Skillsoft | 100% Correct
Answers | Verified | Latest 2024 Version
You have opened File Explorer and are in the c:\PLAB directory. You want to open the command prompt
and navigate to the same directory. You need to do this with minimum administrative effort. What
should you do? - ✔✔In the address bar of the File Explorer window, type cmd and press Enter.



After facing a system-security incident, you need to work on the post-incident response. Identify the
tasks that you must perform as part of the post-incident response:

Perform a structural review

Assess damage caused by the incident

Isolate the impacted network segment

Find source of the incident

Prepare a detailed report and submit to the stakeholders - ✔✔2, 3, 4, 5



Over the years, several systems have corroded, and a few systems are victim of overheating. Even though
there is an optimum air conditioning in the office, but overheating continues to increase in the many
systems. Which of the following could prevent this from happening? - ✔✔Install air filters in the office



Which of the following actions is NOT performed by the man-in-the-middle attacker? - ✔✔Using
compromised systems called zombie systems to overload the server, making it unavailable to the client



Users on a network are complaining that they cannot connect to a Web server by its name in the Web
browser. You can access the Web server using its IP address. You discover an access list is blocking
several UDP ports. Which port should you remove from the access list to allow users to connect to the
Web server? - ✔✔UDP: 53



A wireless controller is used to:collectively configure wireless access points as a single entitymonitor and
collect statistical data on wireless network behavior and usageupdate firmware and OS versions of
access points when available.Which of the preceding statements is true? - ✔✔Statements 1, 2 and 3

,You have connected to the wireless router at home and are getting limited connectivity. What should be
the first thing that you should do? - ✔✔Check if the wireless router DHCP service is working



You are working on a CentOS system with the default installation. You notice that there is a system
slowness. You suspect memory overutilization by a specific process. To verify this, you want to view the
memory utilization over time. You decide to run the following command:ps ev -pid=2500What else
should you ensure that you are able to gather the information over time?[Choose all that apply] -
✔✔Repeat the command manually over time & Create a cron job to run this command



The Sales team in your organization has been assigned new Android phones. You, as the IT Manager, do
not want them to install any applications from the Internet. The Sales team should be able to install only
the approved applications from your app store. How would you control this? - ✔✔Use MDM to manage
the mobile devices



Which of the following can help identify a computer hoax? - ✔✔Spam filter



You want to transfer files from your Linux system to another Linux system on the network. You want to
ensure that the transfer is fast, and the file is compressed while being transferred. However, the file
should be copied onto the destination system in the decompressed format. What should you do? -
✔✔Use the scp command with the -C parameter



You receive an encrypted E-mail on your mobile device which you are unable to decrypt. What could be
the possible cause? - ✔✔Expired certificate



Which of the following is considered to be the main cause of blue screens in Windows? - ✔✔Memory



You regularly get updates from Microsoft on Windows 10. Identify the reasons why Microsoft would be
regularly updating Windows 10?[Choose all that apply] - ✔✔Operating system stability, New system
functionality, & Security



You have a network that is divided into multiple subnets. You need to configure the servers in a
particular subnet to allow access only from the administrator's system using SSH. Everything else must
be blocked on all servers. To be able to meet this goal, what should you do? - ✔✔Configure a host-based
firewall on all servers and allow the only SSH

,You have a room that has a server with critical and confidential data. The room is protected with a door
lock. You need to add security so that you can track who has entered the room. Which of the following
method should you use?[Choose all that apply] - ✔✔ID badges & Biometrics



You have managed to resolve a complicated technical issue at the customer's site. You tested the
solution multiple times and got positive results. You inform the customer that the problem has been
resolved. How should you proceed beyond this point? - ✔✔Document the case and share with the
customer and internal team



You have been sent to attend a service ticket of an irate customer. After meeting the customer, you find
him to be using a loud voice and using bad language. You manage to close the ticket successfully. After
returning to your office, how should you react to this situation? - ✔✔Inform your manager about the
customer



Refer to the exhibit. What does the Green color in the exhibit indicate? - ✔✔Files are encrypted



Recently, a server in your organization was compromised. This was acting as a file server and contained
sensitive data. The server has two partitions - one partition holds the operating system and the other
partition holds data. You regularly make a backup on a weekly basis.After investigation, you discover that
the server was infected with a rootkit. Which method would be most appropriate to restore the infected
server? - ✔✔Format the data and operating system partitions, then re-install the operating system and
restore all data from last clean backup



An audio clip is being played in the windows media center. The clip needs to be stopped for a short while
and then it has to be played from the point where it was stopped. Based on the function, choose the
button which should be used to stop the clip? - ✔✔Play/Pause



During a vulnerability assessment, you are able to locate a potential vulnerability. After reporting it to
the security team and with their further investigation, it is concluded that it is not a vulnerability. What
should you do now? - ✔✔Document the results and create a report as per the company's incident
response plan



If you have 1 GB RAM in a system, which of the following 32-bit Windows versions will you be able to
install?[Choose all that apply] - ✔✔Windows Vista, 7, 8.1, 10

, Recently, a user lost his laptop that had confidential data. You want to protect the company's data even if
a laptop is lost. No one should be able to access the data at rest without proper authentication at boot.
What should you do? - ✔✔Use BitLocker to encrypt the disk



You have two-factor authentication in your organization that uses a smart card and a password. The
Chief Technology Officer (CTO) wants to upgrade this setup to multi-factor authentication. Which of the
following can help achieve this? - ✔✔Implement a fingerprint scanner



Due to a sudden voltage increase, one of the desktops has completely burnt out. You need to protect
this from happening in the future. What should you do?[Choose all that apply.] - ✔✔Use a surge
suppressor & use a power conditioner



The Windows on your laptop has crashed, and you need to re-install it. You do not have the installation
discs with you. What is the best way to restore the computer system to its factory settings? - ✔✔Restore
using the factory recovery partition



You create a shell script and attempt to run it. You are prompted with the permission denied error.
Before executing a shell script, which permission must you assign it with the chmod command? - ✔✔+x



You had created a link named PLAB to the PLAB/PracticeIT/London directory. You want to remove the
link now. What should you do?[Choose all that apply] - ✔✔Use the rm and unlink command



You have created a small JavaScript file with the .js extension. You need to refer it in an HTML document.
What should you do?[Choose all that apply.] - ✔✔Load the jquery library within the head tag, Download
the jquery library, & Add the .js file within the head tag



With the most recent update of Windows 10, you are unable to find the UAC settings. You decide to use
the msconfig tool to launch the UAC settings. Which tab in msconfig should you use for this purpose? -
✔✔Tools



Which question should be most appropriate when planning for an IT change? - ✔✔How should the
change be implemented?

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller hov. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $8.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

81298 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$8.99
  • (0)
  Add to cart