JK0-802 CompTIA A+ Certification Exam Set 10

A user receives an unsolicited call from a technician claiming to be from a Microsoft certified partner. The technician tricks the user into allowing them access to their PC because of malware alerts that were being broadcasted. Which of the following attacks is this user a victim of?


Options are :

  • Social engineering (Correct)
  • Shoulder surfing
  • Phishing attack
  • Malware infection

Answer : Social engineering

When running a combination of full and incremental backups, which of the following represents the required tapes in order to completely restore a system?


Options are :

  • Only the latest incremental backup is required.
  • Only the latest full backup is required
  • The system cannot be restored completely using full and incremental backups
  • The latest full and all incremental backups since the last full backup (Correct)

Answer : The latest full and all incremental backups since the last full backup

Which of the following helps to prevent virus infections from USB flash drives?


Options are :

  • Disabling the autorun feature (Correct)
  • Strong passwords
  • Disabling the guest account
  • Password protected screen savers

Answer : Disabling the autorun feature

A user has a damaged file and has problems booting up. Which of the following is the BEST choice to repair a corrupted Windows XP boot file?


Options are :

  • FIXBOOT (Correct)
  • FDISK
  • BOOTREC
  • FORMAT

Answer : FIXBOOT

A technician is interested in running a test to see how much latency exists between a workstation and device at 10.0.0.15. Which of the following command line tools could be used to accomplish this?


Options are :

  • PING 10.0.0.15 (Correct)
  • NETSTAT 10.0.0.15
  • IPCONFIG 10.0.0.15
  • NSLOOKUP 10.0.0.15

Answer : PING 10.0.0.15

A company is looking to donate a collection of old PCs that are no longer needed. Which of the following data destruction methods would be MOST secure for highly sensitive information?


Options are :

  • Low level 3-pass random wipe
  • High level format 10 times
  • Low level 7-pass random wipe (Correct)
  • Simple 1-pass zero overwrite

Answer : Low level 7-pass random wipe

After several passes with a malware removal program, the program keeps detecting the same malware infection after a reboot. Which of the following should be done to attempt to remove the offending malware?


Options are :

  • Reinstall the malware removal program from a trusted source
  • Run the malware removal program in Windows Safe Mode (Correct)
  • Set the malware removal program to run each time the computer is rebooted
  • Run the malware removal program while disconnected from the Internet

Answer : Run the malware removal program in Windows Safe Mode

Which of the following identifies traffic based upon its physical network address?


Options are :

  • MAC filtering (Correct)
  • Phishing
  • Hashing
  • Geotracking

Answer : MAC filtering

Which of the following file systems has a 4GB file size limit?


Options are :

  • FAT
  • CDFS
  • FAT32 (Correct)
  • NTFS

Answer : FAT32

Anne, a lab administrator, is setting up the computer lab with multiple workstations and wants to minimize the amount of time to configure each workstation. Which of the following would allow for Anne to configure a single workstation?


Options are :

  • System Restore
  • Multiboot
  • ROBOCOPY
  • Image deployment (Correct)

Answer : Image deployment

Which of the following actions can Power Users perform?


Options are :

  • Backup the operating system and system files
  • Modify any local user account
  • Install computer applications that require administrative privileges
  • Create local users accounts (Correct)

Answer : Create local users accounts

Which of the following should a technician implement to prevent external contractors from physically plugging devices into the companys network jacks unless such jacks are designated for guest use?


Options are :

  • Disable DHCP and assign a static IP address to each network device physically connected to the network.
  • Disable all switch ports when they are not utilized and enable them on an as needed basis (Correct)
  • Place guest network jacks in public areas and all other jacks in secure areas as needed.
  • Enable MAC address filtering across all network jacks and record the MAC address of guest devices.

Answer : Disable all switch ports when they are not utilized and enable them on an as needed basis

A technician wants to see if the computer has a route to a remote network. Which of the following commands will display the routing table of the PC?


Options are :

  • pathping
  • netstat (Correct)
  • nbtstat
  • ipconfig

Answer : netstat

Which of the operating systems can be upgraded to Windows 7 Professional?


Options are :

  • Windows XP Professional
  • Windows 7 Enterprise
  • Windows Vista Home Premium
  • Windows Vista Business (Correct)

Answer : Windows Vista Business

A user is unable to reach certain Internet sites and is being redirected to other sites. Which of the following Control Panel locations could provide information to resolve this issue?


Options are :

  • Internet Options > Security
  • Internet Options > Connections (Correct)
  • System > Advanced
  • Security Center

Answer : Internet Options > Connections

A technician is installing Windows 7 on a new PC. Which of the following would be the MOST likely third party driver needed during installation?


Options are :

  • Network
  • RAID (Correct)
  • Sound
  • Video

Answer : RAID

When using a PC on a Windows Domain, which of the following is the MOST critical service when connecting to multiple file, print, and email servers?


Options are :

  • Computer Browser Service
  • DNS Service (Correct)
  • Windows Firewall Service
  • Internet Connection Sharing Service

Answer : DNS Service

With default settings in Windows 7 64-bit which of the following groups is allowed to install unsigned drivers while giving the LEAST amount of permissions?


Options are :

  • Standard User
  • Authenticated User
  • Administrator (Correct)
  • Power User

Answer : Administrator

Which of the following utilities would a technician use on a Windows Vista or Windows 7 machine to configure what applications are allowed to send/receive data over the LAN connection?


Options are :

  • Windows Firewall (Correct)
  • Users and Groups
  • Task Scheduler
  • Registry Editor

Answer : Windows Firewall

A technician is tasked with improving the security of a SOHO network. The office is comprised of a single wireless router located under the front desk where the office manager sits. All desktop computers are wired into the router which is configured with strong device credentials. Additionally, wireless is disabled on the router. Which of the following should the technician perform NEXT to improve the security of the SOHO network?


Options are :

  • Disable the routers remote management feature
  • Place the router in a locked room (Correct)
  • Enable WPA2 wireless encryption.
  • Change the routers default admin name and password.

Answer : Place the router in a locked room

A PC has sensitive data that must be destroyed, before the PC is redeployed. A technician has been tasked with completely wiping the PC hard drive. Which of the following methods is BEST for the technician to use?


Options are :

  • Low level format (Correct)
  • Standard format
  • Quick format
  • FDISK

Answer : Low level format

An employee at a company lost their mobile device that contains proprietary information.

Which of the following methods is the BEST to be implemented to prevent unauthorized users from obtaining this information?


Options are :

  • Lock screen pattern
  • Remote wipe (Correct)
  • Six character password
  • Cancel mobile service

Answer : Remote wipe

The manager has requested that their laptop be setup so that a static IP can be assigned to the wireless card while in the office, but have the ability to utilize DHCP when at home. Which of the following Windows 7 options can accomplish this?


Options are :

  • IPCONFIG Command Utility
  • Client for Microsoft Networks
  • Manage Wireless Networks
  • Alternate Configuration (Correct)

Answer : Alternate Configuration

A user would like to run a copy of Windows XP for testing; however, the user is currently using a Windows 7 PC. Which of the following technologies should a technician recommend in order for the user to have access to both systems simultaneously?


Options are :

  • KVM switch
  • Purchase a second PC
  • Virtualization (Correct)
  • Dual boot

Answer : Virtualization

A technician wants to test out Windows 7 before deploying it on a workstation. Which of the following must be completed FIRST in order to run Windows 7 from a bootable USB drive?


Options are :

  • Format the USB drive to FAT16 file format
  • Copy over the config.sys file
  • Copy over the boot.ini file
  • Create a primary partition and make it active (Correct)

Answer : Create a primary partition and make it active

Which of the following is TRUE about the difference between a worm and a virus?


Options are :

  • Viruses disable the antivirus update service while worms kill the antivirus process.
  • Worms self-propagate while viruses need human intervention to replicate. (Correct)
  • Viruses hide in the boot record while worms hide within the file system
  • Worms are written in assembly while viruses are written with scripting languages

Answer : Worms self-propagate while viruses need human intervention to replicate.

Which of the following requirements must be considered when implementing virtual servers with sensitive information?


Options are :

  • Security (Correct)
  • DMZ
  • Firewall
  • Network

Answer : Security

Which of the following computers would be MOST suitable to host virtual workstations?


Options are :

  • A computer with a 6-core processor, 64 GB RAM, 1 TB SSD hard drive, and a Gigabit NIC (Correct)
  • A computer with a 6-core processor, 512 MB RAM, 1 TB hard drive, and a Gigabit NIC
  • A computer with a 6-core processor, 64 GB RAM, 1 TB SSD hard drive, and a Fast Ethernet NIC
  • A computer with a 6-core processor, 512 MB RAM, 1 TB SSD hard drive, and a Gigabit NIC

Answer : A computer with a 6-core processor, 64 GB RAM, 1 TB SSD hard drive, and a Gigabit NIC

A customer needs to setup their laptop for use with a proxy server to browse the web at work. Which of the following areas would a technician need to visit to configure this on a Windows 7 system?


Options are :

  • System Protection
  • Security Center
  • Windows Firewall
  • Internet Options (Correct)

Answer : Internet Options

C$ is an example of which of the following?


Options are :

  • Mapped network drive
  • Inheritance
  • Local share
  • Administrative share (Correct)

Answer : Administrative share

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions