220-802 CompTIA A+ Certification Practice Exam Set 6

A user is unable to reach certain Internet sites and is being redirected to other sites. Which of the

following Control Panel locations could provide information to resolve this issue?


Options are :

  • Internet Options > Connections (Correct)
  • Internet Options > Security
  • System > Advanced
  • Security Center

Answer : Internet Options > Connections

A technician is asked to create a login for each member of a four person family, on a home

computer running Windows 7. The parents need to have administrative access but the children

need to be standard users. Which of the following Control Panel icons should the technician select

to create these logons?


Options are :

  • Personalization
  • Parental Controls
  • User Account Control
  • User Accounts (Correct)

Answer : User Accounts

A technician wants to see if the computer has a route to a remote network. Which of the following

commands will display the routing table of the PC?


Options are :

  • ipconfig
  • pathping
  • netstat (Correct)
  • nbtstat

Answer : netstat

For the last year, a company has gathered statistics on the most common security incidents.

The highest percentage deals with opening email attachments that contain malware. Which of the

following would mitigate this issue without reducing productivity?


Options are :

  • Block all email attachments
  • Update antivirus signatures more often
  • Annual cyber security education (Correct)
  • Install an IPS on each workstation

Answer : Annual cyber security education

A company wants to prevent non-authorized users from entering into a secure building. Which of

the following will BEST mitigate this activity?


Options are :

  • Train users on tailgating
  • Implement an escort policy
  • Require all users to have badges
  • Install mantraps (Correct)

Answer : Install mantraps

Which of the following actions can Power Users perform?


Options are :

  • Modify any local user account
  • Install computer applications that require administrative privileges
  • Create local users accounts (Correct)
  • Backup the operating system and system files

Answer : Create local users accounts

Which of the following helps to prevent virus infections from USB flash drives?


Options are :

  • Disabling the guest account
  • Password protected screen savers
  • Disabling the autorun feature (Correct)
  • Strong passwords

Answer : Disabling the autorun feature

A technician has configured the ability to connect to a small office server using remote desktopfrom a workstation within the office. The technician has reviewed logs that show constant brute

force attacks to that server from outside the network. Which of the following would prevent this

from occurring?


Options are :

  • Reallocate the server to a different networking closet
  • Logically move the server to the DMZ
  • Disable the remote desktop port (Correct)
  • Configure the server to use a static IP

Answer : Disable the remote desktop port

An employee at a company lost their mobile device that contains proprietary information.

Which of the following methods is the BEST to be implemented to prevent unauthorized users

from obtaining this information?


Options are :

  • Six character password
  • Cancel mobile service
  • Remote wipe (Correct)
  • Lock screen pattern

Answer : Remote wipe

In Windows 7, which of the following is the MOST restrictive network location setting to control

sharing files and granting access to a computer over a network?


Options are :

  • Public (Correct)
  • WAN
  • Home
  • Work

Answer : Public

A customer needs to setup their laptop for use with a proxy server to browse the web at work.

Which of the following areas would a technician need to visit to configure this on a Windows 7

system?


Options are :

  • Internet Options (Correct)
  • Security Center
  • Windows Firewall
  • System Protection

Answer : Internet Options

A small business owner is setting up their wireless network in their office, which is in a building

shared with several other businesses. The owner does not want to disable the SSID broadcasting

due to visiting customers needing to use the network, but does not want other businesses to

notice the network, let alone access it. Which of the following would BEST accomplish this?


Options are :

  • Enable MAC filtering and restrict access to other company’s devices.
  • Adjust the radio power so that coverage is restricted to the business. (Correct)
  • Configure the access point encryption from unsecured access to WEP.
  • Change the SSID to reflect the business name instead of a public access point.

Answer : Adjust the radio power so that coverage is restricted to the business.

In order to prevent other users from editing files in ‘C:\ Files’, which of the following steps should

be taken?


Options are :

  • Set network share permissions to read only
  • Set the folder to index files for search
  • Set the local administrator as the owner of the folder
  • Set NTFS permissions to read only (Correct)

Answer : Set NTFS permissions to read only

An attack that creates a website that looks like another website, with the purpose of learning

someone’s account information is called which of the following?


Options are :

  • Phishing (Correct)
  • Trojan
  • Virus
  • Shoulder surfing

Answer : Phishing

A company wants to ensure that the latest cyber security threats are known to the employees

across the enterprise to minimize occurrences. Which of the following should be implemented?


Options are :

  • Message of the Day
  • Email lists
  • Regular user education (Correct)
  • Company forums

Answer : Regular user education

Which of the following is a disadvantage of running a virtual machine?


Options are :

  • Difficult software testing
  • Decreased performance (Correct)
  • Long recovery time
  • Hard drive compatibility

Answer : Decreased performance

Which of the following should a technician implement to prevent external contractors from

physically plugging devices into the company’s network jacks unless such jacks are designated for

guest use?


Options are :

  • Disable DHCP and assign a static IP address to each network device physically connected to the network.
  • Enable MAC address filtering across all network jacks and record the MAC address of guest devices.
  • Place guest network jacks in public areas and all other jacks in secure areas as needed.
  • Disable all switch ports when they are not utilized and enable them on an as needed basis. (Correct)

Answer : Disable all switch ports when they are not utilized and enable them on an as needed basis.

A technician is troubleshooting an issue with a set of services that are running on a computer.

Which of the following commands can be used to affect the status of services running on a

computer? (Select TWO).

A. Net Computer

B. Net Use

C. Net Pause

D. Net Stop

E. Net Session


Options are :

  • C,D (Correct)
  • B,C
  • A,B
  • A,D

Answer : C,D

A PC has sensitive data that must be destroyed, before the PC is redeployed. A technician has

been tasked with completely wiping the PC hard drive. Which of the following methods is BEST for

the technician to use?


Options are :

  • Standard format
  • Low level format (Correct)
  • FDISK
  • Quick format

Answer : Low level format

Which of the following security threats is defined by its self-propagating characteristic?


Options are :

  • Worm (Correct)
  • Trojan
  • Rootkit
  • Virus

Answer : Worm

A technician wants to ensure that only authorized administrators can make configuration changes

to the company’s wireless router. Which of the following MUST the technician change to prevent

unauthorized users from modifying the access point configuration?


Options are :

  • MAC address filters
  • Manufacturer password (Correct)
  • Default SSID
  • Configure encryption

Answer : Manufacturer password

With default settings in Windows 7 64-bit which of the following groups is allowed to install

unsigned drivers while giving the LEAST amount of permissions?


Options are :

  • Power User
  • Standard User
  • Administrator (Correct)
  • Authenticated User

Answer : Administrator

Which of the following security threats are MOST often delivered via email? (Select TWO).

A. Rootkits

B. Phishing

C. Shoulder surfing

D. Social engineering

E. Spam


Options are :

  • B,E (Correct)
  • D,E
  • C,D
  • A,C

Answer : B,E

Which of the following computers would be MOST suitable to host virtual workstations?


Options are :

  • A computer with a 6-core processor, 512 MB RAM, 1 TB hard drive, and a Gigabit NIC
  • A computer with a 6-core processor, 64 GB RAM, 1 TB SSD hard drive, and a Gigabit NIC (Correct)
  • A computer with a 6-core processor, 64 GB RAM, 1 TB SSD hard drive, and a Fast Ethernet NIC
  • A computer with a 6-core processor, 512 MB RAM, 1 TB SSD hard drive, and a Gigabit NIC

Answer : A computer with a 6-core processor, 64 GB RAM, 1 TB SSD hard drive, and a Gigabit NIC

An administrator needs to temporarily change the host name of a computer that is on the

company's domain. Which of the following would be the BEST way to accomplish this and still

maintain access to individual roaming profile's network shares?


Options are :

  • Add the PC to the workgroup and reboot. Rejoin the PC to the domain. Rename the PC and reboot.
  • Add the PC to the workgroup and reboot. Rename the PC and reboot. Rejoin the PC to the domain. (Correct)
  • Change the name of the PC and reboot. Rejoin it to the domain and reboot.
  • Change the name of the PC. Join it to the workgroup and then to the domain.

Answer : Add the PC to the workgroup and reboot. Rename the PC and reboot. Rejoin the PC to the domain.

The manager has requested that their laptop be setup so that a static IP can be assigned to the

wireless card while in the office, but have the ability to utilize DHCP when at home. Which of the

following Windows 7 options can accomplish this?


Options are :

  • IPCONFIG Command Utility
  • Manage Wireless Networks
  • Client for Microsoft Networks
  • Alternate Configuration (Correct)

Answer : Alternate Configuration

A technician is installing Windows 7 on a new PC. Which of the following would be the MOST

likely third party driver needed during installation?


Options are :

  • Video
  • Network
  • RAID (Correct)
  • Sound

Answer : RAID

A user is advised by the software vendor that the user must have elevated privileges in order to

run a program. The user should do which of the following to BEST accomplish this?


Options are :

  • Log out of the system and login under another user’s name
  • Run in Windows XP compatibility mode
  • Run the program in a virtual PC environment
  • Right click select “run as” and select administrator (Correct)

Answer : Right click select “run as” and select administrator

Which of the operating systems can be upgraded to Windows 7 Professional?


Options are :

  • Windows Vista Business (Correct)
  • Windows XP Professional
  • Windows 7 Enterprise
  • Windows Vista Home Premium

Answer : Windows Vista Business

A technician must secure company documents from accidental disclosure. Which of the following

should be implemented? (Select TWO).

A. User training

B. Anti-malware

C. Paper shredding

D. Time of day restrictions

E. Employee badges

F. Mantraps


Options are :

  • E,D
  • E,F
  • A,B
  • A,C (Correct)

Answer : A,C

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions