Comptia a+ Core 2 Flashcards

  • 3,000
  • Tác giả: admin
  • Ngày đăng:
  • Lượt xem: 3
  • Tình trạng: Còn hàng

Students also studied

Study guides

Practice questions for this set

Which of the following alternatives can a customer select from when an issue cannot be resolved remotely? (Select all that apply.)

Duplicates the function of core OS apps.

To ensure the authenticity and authorization of a mobile tiện ích, a service provider issues a certificate vĩ đại valid developers. Developers can use this certificate vĩ đại sign their tiện ích, and vĩ đại establish trust. Which of the following attributes of an tiện ích would likely disqualify as trustworthy?

An attacker imitates an IT Support tech for a company. The attacker asks for a users password vĩ đại gain access vĩ đại the users system remotely. what is this attack called?

BIOS (basic input/output system)

A company uses a method that restricts it employees from messing with their computer settings. What method vì thế they use?

The operating system update on a users phone fails. The user verified the phones connection vĩ đại a wall outlet that leads vĩ đại the office WIFI. Which of the following could be responsible for the update failure?

A server admin migrates their environment from physical servers vĩ đại a virtualized environment. The admin wants vĩ đại install new virtual machine operating systems. what is the best approach vĩ đại use regarding deploying virtualized OSs

ISO files stored on removable truyền thông media or a host system are often used vĩ đại install virtual machine operating systems. A mountable ISO is often used vĩ đại install complex apps, such as databases, where there are many separate components and large tệp tin sizes vĩ đại install.
An ISO tệp tin could be distributed on physical truyền thông media, such as CD/DVD or a USB thumb drive, but typically is done through tệp tin sharing on an enterprise network.
An ISO can be downloaded, although the administrator should kiểm tra vĩ đại ensure that the tệp tin hash matches the official hash

What is also know as a potentially unwanted applications (PUA) and should be removed from the computer.

Which of the following uses a security shield icon for tasks that are protected under them?

What avoids opening remote desktop ports on the network's firewall?
- establishes a tunneled liên kết that joins a local computer vĩ đại a remote network. Establish a liên kết and then use a remote desktop vĩ đại connect vĩ đại a host on the private network.

Check HOSTS files for malicious entries

An employee enters the trang web address of their local newspaper vĩ đại kiểm tra for news on the company, and a site pops up with many click-bait celebrity stories. The employee re-enters the address assuming a misspelling but returns vĩ đại the same page. When the help desk technician arrives, which of the following troubleshooting steps would be appropriate?

Which of the following alternatives can a customer select from when an issue cannot be resolved remotely? (Select all that apply.)

Change mặc định administrator trương mục.

Which of the following should generate an alert when the trương mục is disabled or altered?

A user notices that their device has a leaking component and needs vĩ đại take careful measures vĩ đại minimize any risk and discard the approved component at the proper waste facility. Which of the following disposal is this?

A technician is using a tool with a secure erase function that performs a zero-filling on HDDs and marks all blocks as empty on SSDs. The SSD firmware's automatic garbage collectors then perform the actual erase of each block over time. What is this tool?

The share was created on a Windows desktop
-The Share tab in the folder's Properties dialog can customize permissions, change the share name, and limit the number of simultaneous connections. Windows desktop versions are limited vĩ đại đôi mươi inbound connections.

A marketing professional normally sends large files vĩ đại other team members. The IT department recommended using a shared drive and assisted them in setting it up. The project was a very high priority, ví the professional collaborated with several members but started receiving reports that some users could not access it sometimes and others could. They eventually figured out that only đôi mươi people at a time seemed vĩ đại be able vĩ đại access it. What is causing the issue?