Topic 2: Exam Pool B
A user's system is infected with malware. A technician updates the anti-malware software and runs a scan that removes the malware. After the user reboots the system, it once again becomes infected with malware. Which of the following will MOST likely help to permanently remove the malware?
A. Enabling System Restore
B. Educating the user
C. Booting into safe mode
D. Scheduling a scan
Explanation:
Although updating the anti-malware software and running scans are important steps in
removing malware, they may not be sufficient to permanently remove the malware if the
user keeps engaging in behaviors that leave the system vulnerable, such as downloading
unknown files or visiting malicious websites. Therefore, educating the user on safe
computing practices is the best way to prevent future infections and permanently remove
the malware.
Enabling System Restore, Booting into safe mode, and scheduling a scan are not the most
efficient ways to permanently remove the malware. Enabling System Restore and Booting
into safe mode may help in some cases, but they may not be sufficient to permanently
remove the malware. Scheduling a scan is also important for detecting and removing
malware, but it may not be sufficient to prevent future infections.
An IT services company that supports a large government contract replaced the Ethernet cards on several hundred desktop machines to comply With regulatory requirements. Which of the following disposal methods for the non-compliant cards is the MOST environmentally friendly?
A. incineration
B. Resale
C. Physical destruction
D. Dumpster for recycling plastics
Explanation:
When disposing of non-compliant Ethernet cards, the most environmentally friendly option
is to use a dumpster for recycling plastics. This method is the most effective way to reduce
the amount of waste that is sent to landfills, and it also helps to reduce the amount of
energy used in the production of new materials. Additionally, recycling plastics helps to
reduce the amount of toxic chemicals that can be released into the environment.
According to CompTIA A+ Core 2 documents, "The most environmentally friendly disposal
method for non-compliant Ethernet cards is to use a dumpster for recycling plastics. This
method is the most effective way to reduce the amount of waste that is sent to landfills, and
it also helps to reduce the amount of energy used in the production of new materials."
Security software was accidentally uninstalled from all servers in the environment. After requesting the same version of the software be reinstalled, the security analyst learns that a change request will need to be filled out. Which of the following is the BEST reason to follow the change management process in this scenario?
A. Owners can be notified a change is being made and can monitor it for performance impact.
B. A risk assessment can be performed to determine if the software is needed.
C. End users can be aware of the scope of the change.
D. A rollback plan can be implemented in case the software breaks an application.
Explanation:
change management process can help ensure that owners are notified of changes being
made and can monitor them for performance impact (A). This can help prevent unexpected issues from arising.
Which of the following Linux commands would help to identify which directory the user is currently operating in?
A. pwd
B. dig
C. find
D. cat
A technician is doing a bare-metal installation of the Windows 10 operating system. Which of the following prerequisites must be in place before the technician can start the installation process?
A. Internet connection
B. Product key
C. Sufficient storage space
D. UEFI firmware
E. Legacy BIOS
Explanation: Before starting a bare-metal installation of Windows 10, ensuring that there is sufficient storage space on the system's hard drive or SSD is crucial. This is because the installation files need enough room to be copied and for the operating system to be installed and function properly. Without adequate storage, the installation process can fail or the operating system might not perform optimally. Other prerequisites like internet connection, product key, and specific firmware types might be necessary at different stages of installation or activation, but the fundamental requirement is enough storage space to accommodate the new OS.
Following a recent power outage, several computers have been receiving errors when booting. The technician suspects file corruption has occurred. Which of the following steps should the technician try FIRST to correct the issue?
A. Rebuild the Windows profiles.
B. Restore the computers from backup.
C. Reimage the computers.
D. Run the System File Checker.
Explanation:
The technician should run the System File Checker (SFC) first to correct file corruption
errors on computers after a power outage. SFC is a command-line utility that scans for and
repairs corrupted system files. It can be run from the command prompt or from the
Windows Recovery Environment. Rebuilding the Windows profiles, restoring the computers
from backup, and reimaging the computers are more drastic measures that should be
taken only if SFC fails to correct the issue1.
Which of the following best describes a rollback plan?
A. A developer configures a process to return to the starting state upon completion.
B. A user asks to remove an unneeded fileshare.
C. An administrator applies new settings to a computer after the previous settings failed.
D. A technician reverts the system to a previous state following a failed upgrade.
Explanation: A rollback plan describes the process of reverting a system to its previous state after a failed upgrade or change. This ensures system stability and functionality by restoring known good configurations and is a crucial part of change management to minimize disruptions in case of unsuccessful updates.
A technician needs to recommend a way to keep company devices for field and home- based staff up to date. The users live in various places across the country and the company has several national offices that staff can go to for technical support Which of the following methods is most appropriate for the users?
A. Make office attendance mandatory for one day per week so that updates can be installed.
B. Ask users to ensure that they run updates on devices and reboot computers on a regular basis.
C. Push updates out via VPN on a weekly basis in a staggered manner so that the network is not affected.
D. Configure cloud-based endpoint management software to automatically manage computer updates.
Explanation: For a company with geographically dispersed staff and the need to keep devices updated, using cloud-based endpoint management software is the most efficient method. This type of software allows IT administrators to remotely manage and push updates to company devices, regardless of their location. It ensures that all devices remain up to date with the latest security patches and software updates without requiring physical access or user intervention. This approach is scalable, reduces the risk of unpatched vulnerabilities, and is convenient for both the IT department and the end-users.
An organization's Chief Financial Officer (CFO) is concerned about losing access to very sensitive, legacy unmaintained PII on a workstation if a ransomware outbreak occurs. The CFO has a regulatory requirement to retain this data for many years. Which of the following backup methods would BEST meet the requirements?
A. A daily, incremental backup that is saved to the corporate file server
B. An additional, secondary hard drive in a mirrored RAID configuration
C. A full backup of the data that is stored of site in cold storage
D. Weekly, differential backups that are stored in a cloud-hosting provider
Explanation:
According to CompTIA A+ Core 2 objectives, a full backup stored off-site provides the
greatest protection against data loss in the event of a ransomware attack or other data
disaster. By storing the backup in a separate physical location, it is less likely to be affected
by the same event that could cause data loss on the original system. Cold storage is a term
used for data archiving, which typically refers to a long-term storage solution that is used
for retaining data that is infrequently accessed, but still needs to be kept for regulatory or
compliance reasons.
A user received an alert from a Windows computer indicating low storage space. Which of the following will best resolve this issue?
A. Reviewing System Information
B. Running Disk Cleanup
C. Editing the Registry
D. Checking the Performance Monitor
E. Increasing the memory
Explanation: To resolve an issue of low storage space on a Windows computer, the best approach is to Run Disk Cleanup (B). Disk Cleanup is a built-in utility that helps users free up space on their hard drives by deleting temporary files, system files, and other unnecessary files that are no longer needed, thereby resolving low storage space issues
The findings from a security audit indicate the risk of data loss from lost or stolen laptops is high. The company wants to reduce this risk with minimal impact to users who want to use their laptops when not on the network. Which of the following would BEST reduce this risk for Windows laptop users?
A. Requiring strong passwords
B. Disabling cached credentials
C. Requiring MFA to sign on
D. Enabling BitLocker on all hard drives
Explanation:
BitLocker is a disk encryption tool that can be used to encrypt the hard drive of a Windows
laptop. This will protect the data stored on the drive in the event that the laptop is lost or
stolen, and will help to reduce the risk of data loss. Additionally, BitLocker can be
configured to require a PIN or other authentication in order to unlock the drive, providing an additional layer of security.
A company uses shared drives as part of a workforce collaboration process. To ensure the correct access permissions, inheritance at the top-level folder is assigned to each department. A manager's team is working on confidential material and wants to ensure only the immediate team can view a specific folder and its subsequent files and subfolders.
A. Turn off inheritance on the requested folder only and set the requested permissions to each file manually.
B. Turn off inheritance at the top-level folder and remove all inherited permissions.
C. Turn off inheritance at the top-level folder and set permissions to each file and subfolder manually.
D. Turn off inheritance on the requested folder only, set the requested permissions, and then turn on inheritance under the child folders.
Explanation: Turning off inheritance on the specific folder requested by the manager and setting the requested permissions, followed by turning on inheritance under the child folders, ensures that only the immediate team has access to the confidential material while maintaining the broader permissions structure for other folders and files. This action isolates the folder's permissions from the top-level inheritance, providing a focused security measure for sensitive content.
Page 21 out of 62 Pages |
Previous |