JK0-802 CompTIA A+ Certification Exam Set 9

Which of the following items differentiates Windows 7 Enterprise from Windows 7 Ultimate?


Options are :

  • Can use Bitlocker encryption
  • Can join an Active Directory domain
  • Requires volume licensing (Correct)
  • Supports Multilingual User Interface

Answer : Requires volume licensing

In Windows 7, which of the following is the MOST restrictive network location setting to control sharing files and granting access to a computer over a network?


Options are :

  • WAN
  • Home
  • Public (Correct)
  • Work

Answer : Public

An administrator is concerned about users accessing network shares outside of their job role.

Which of the following would BEST prevent this?


Options are :

  • Prevent remote logins to all network shares and drives.
  • Implement a written policy addressing the issue for all users
  • Implement a written policy addressing the issue for all users
  • Set up shares with permissions based upon group membership. (Correct)

Answer : Set up shares with permissions based upon group membership.

A technician must secure company documents from accidental disclosure. Which of the following should be implemented? (Select TWO).

A. User training

B. Anti-malware

C. Paper shredding

D. Time of day restrictions

E. Employee badges

F. Mantraps


Options are :

  • E,F
  • A,C (Correct)
  • D,E
  • A,B

Answer : A,C

A technician is implementing a SOHO wireless network for Company A that shares a floor with Company B. Which of the following would BEST secure the wireless network so that only Company A employees are allowed access?


Options are :

  • Disabling the SSID broadcast
  • Enabling MAC filtering (Correct)
  • Setting a high encryption level
  • Turning down the radio power level

Answer : Enabling MAC filtering

Windows Virtual PC is designed to:


Options are :

  • Allow a user to share a printer to any user on the Internet.
  • Give the user the ability to run 64-bit applications in virtual mode.
  • Allow a user to run older programs in a Windows XP environment. (Correct)
  • Give the user the ability to run multiple operating systems on a tablet.

Answer : Allow a user to run older programs in a Windows XP environment.

An administrator needs to temporarily change the host name of a computer that is on the company's domain. Which of the following would be the BEST way to accomplish this and still maintain access to individual roaming profile's network shares?


Options are :

  • Change the name of the PC and reboot. Rejoin it to the domain and reboot
  • Add the PC to the workgroup and reboot. Rejoin the PC to the domain. Rename the PC and reboot.
  • Change the name of the PC. Join it to the workgroup and then to the domain
  • Add the PC to the workgroup and reboot. Rename the PC and reboot. Rejoin the PC to the domain. (Correct)

Answer : Add the PC to the workgroup and reboot. Rename the PC and reboot. Rejoin the PC to the domain.

A technician wants to ensure that only authorized administrators can make configuration changes to the company’s wireless router. Which of the following MUST the technician change to prevent unauthorized users from modifying the access point configuration?


Options are :

  • Default SSID
  • Configure encryption
  • Manufacturer password (Correct)
  • MAC address filters

Answer : Manufacturer password

Which of the following can preserve permissions when copying files from one volume to another? (Select TWO).

A. DISKPART

B. Robocopy

C. Copy

D. SFC

E. XCOPY


Options are :

  • A,B
  • A,D
  • B,E (Correct)
  • C,D

Answer : B,E

Which of the following optical drives is the MINIMUM required to install Windows 7 Professional from optical media?


Options are :

  • DVD-RW drive
  • DVD-ROM drive (Correct)
  • CD-ROM drive
  • Blu-ray drive

Answer : DVD-ROM drive

For the last year, a company has gathered statistics on the most common security incidents. The highest percentage deals with opening email attachments that contain malware. Which of the following would mitigate this issue without reducing productivity?


Options are :

  • Install an IPS on each workstation
  • Block all email attachments
  • Update antivirus signatures more often
  • Annual cyber security education (Correct)

Answer : Annual cyber security education

A company wants to prevent non-authorized users from entering into a secure building. Which of the following will BEST mitigate this activity?


Options are :

  • Train users on tailgating
  • Require all users to have badges
  • Implement an escort policy
  • Install mantraps (Correct)

Answer : Install mantraps

In order to prevent read errors on a hard drive, which of the following maintenance tools should be set to a regular schedule?


Options are :

  • Windows Update
  • Check Disk (Correct)
  • System Backup
  • Disk Defragmentation

Answer : Check Disk

A company wants to ensure that the latest cyber security threats are known to the employees across the enterprise to minimize occurrences. Which of the following should be implemented?


Options are :

  • Message of the Day
  • Email lists
  • Regular user education (Correct)
  • Company forums

Answer : Regular user education

A user has been reporting their computer is running slow on Fridays after being used all week. A technician believes the problem can be resolved by rebooting the computer. Using the shutdown command in the command prompt on the remote computer, which of the following switches would the technician use to reboot the computer?


Options are :

  • -r (Correct)
  • -a
  • -s
  • –i

Answer : -r

Which of the following allows a user to enable XP mode?


Options are :

  • Windows Vista Ultimate
  • Windows 7 Home Premium
  • Windows 7 Professional (Correct)
  • Windows Vista Home Premium

Answer : Windows 7 Professional

Which of the following security threats is defined by its self-propagating characteristic?


Options are :

  • Worm (Correct)
  • Trojan
  • Rootkit
  • Virus

Answer : Worm

Which of the following is MOST effective in preventing security breaches on a network? (Select THREE).

A. Bandwidth throttling

B. Eliminate password history

C. Enable QoS

D. Antivirus software

E. User education

F. Enforced login/logoff hours


Options are :

  • A,B,C
  • C,D,E
  • D,E,F (Correct)
  • A,C,E

Answer : D,E,F

A user is advised by the software vendor that the user must have elevated privileges in order to run a program. The user should do which of the following to BEST accomplish this?


Options are :

  • Right click select “run as” and select administrator (Correct)
  • Log out of the system and login under another user’s name
  • Run the program in a virtual PC environment
  • Run in Windows XP compatibility mode

Answer : Right click select “run as” and select administrator

A technician is troubleshooting an issue with a set of services that are running on a computer. Which of the following commands can be used to affect the status of services running on a computer? (Select TWO).

A. Net Computer

B. Net Use

C. Net Pause

D. Net Stop

E. Net Session


Options are :

  • C,E
  • A,B
  • C,D (Correct)
  • A,D

Answer : C,D

A technician is trying to prevent a local application from reaching the web due to security concerns. Which of the following solutions could BEST prevent the application from reaching the web? (Select TWO).

A. Configure the workstation for a static IP

B. Disable all wireless network connections

C. Remove shortcuts to the application

D. Block the application in Windows Firewall

E. Change network location to Work

F. Reroute the web address in HOSTS file


Options are :

  • C,D
  • A,B
  • A,E
  • D,F (Correct)

Answer : D,F

Which of the following security threats are MOST often delivered via email? (Select TWO).

A. Rootkits

B. Phishing

C. Shoulder surfing

D. Social engineering

E. Spam


Options are :

  • A,D
  • A,B
  • B,E (Correct)
  • C,D

Answer : B,E

A small business owner is setting up their wireless network in their office, which is in a building shared with several other businesses. The owner does not want to disable the SSID broadcasting due to visiting customers needing to use the network, but does not want other businesses to notice the network, let alone access it. Which of the following would BEST accomplish this?


Options are :

  • Change the SSID to reflect the business name instead of a public access point
  • Configure the access point encryption from unsecured access to WEP.
  • Adjust the radio power so that coverage is restricted to the business. (Correct)
  • Enable MAC filtering and restrict access to other company’s devices.

Answer : Adjust the radio power so that coverage is restricted to the business.

Which of the following would be the QUICKEST means of removing data from a hard drive, when there is no consideration regarding the total destruction of the data?


Options are :

  • Standard format (Correct)
  • Drive wipe
  • Low level format
  • Overwrite program

Answer : Standard format

A technician is asked to create a login for each member of a four person family, on a home computer running Windows 7. The parents need to have administrative access but the children need to be standard users. Which of the following Control Panel icons should the technician select to create these logons?


Options are :

  • Personalization
  • User Account Control
  • User Accounts (Correct)
  • Parental Controls

Answer : User Accounts

An attack that creates a website that looks like another website, with the purpose of learning someone’s account information is called which of the following?


Options are :

  • Phishing (Correct)
  • Virus
  • Trojan
  • Shoulder surfing

Answer : Phishing

Which of the following statements BEST describes client-side virtualization?


Options are :

  • Creating a virtual desktop PC to assist with building a new machine
  • Creating a software-based machine inside the physical machine (Correct)
  • None
  • Using another machine to improve the performance of the current machine
  • Using a virtual reality interface to access the client

Answer : Creating a software-based machine inside the physical machine

Which of the following areas of a file system should a standard user have restricted permissions to in order to promote a security best practice? (Select TWO).

A. Temporary Internet Files

B. My Document Files

C. Windows System Files

D. Network Files

E. Program Files


Options are :

  • D,E
  • B,C
  • A,B
  • C,E (Correct)

Answer : C,E

A Windows XP computer is displaying an error that states "virtual memory is running low". Which of the following tabs in the system Control Panel is used to reconfigure virtual memory settings?


Options are :

  • Hardware
  • Remote desktop
  • Remote settings
  • Advanced (Correct)

Answer : Advanced

Which of the following is a disadvantage of running a virtual machine?


Options are :

  • Decreased performance (Correct)
  • Long recovery time
  • Hard drive compatibility
  • Difficult software testing

Answer : Decreased performance

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions