The CompTIA A+ certification is for IT professionals that can support modern technologies like security, cloud, data management and more. CompTIA A+ is the industry standard for starting a career in the Information Technology sector. The 220-1002 exam is the second in the CompTIA A+ 1000 series (preceded by 220-1001). The 220-1002 exam will cover the following objectives: Operating Systems, Security, Software Troubleshooting and Operational Procedures.
When you use the COPY command, what switch would you use to verify that new files are written correctly?
The copy command can be used across many Operating Systems (OS). The switch /V will verify the new files are written correctly.
In computing, copy is a command in various operating systems. The command copies computer files from one directory to another.
Copy_(command) - Wikipedia, the free encyclopediaYour CEO often travels and works from public areas. Due to the sensitive nature of the CEO's work you want a solution to prevent other people in the public areas from reading confidential data on the CEO's mobile device screen. What solution can help in this scenario?
A privacy screen is a thin piece of plastic that goes over a device's screen. The privacy screen is transparent for users sitting directly in front of the devices screen, but for anyone looking at the screen from an angle the screen is blocked, blurred or heavily darkened. This protects against confidential data on a screen from being easily visible to others in the area.
Google's Chrome OS is unique from other operating systems in that it primarily uses the web browser as it's user interface (Google Chrome). On some devices users can also install Android apps from the Google Play Store. It is not possible to run applications available for other operating systems like Windows and Mac on Chrome OS (unless they have a web version).
Chrome OS (sometimes styled as chromeOS) is a Linux-based operating system designed by Google. It is derived from the free software Chromium OS and uses the Google Chrome web browser as its principal user interface. Unlike Chromium OS, Chrome OS is proprietary software. Google announced the project, then based on Ubuntu, in July 2009, conceiving it as an operating system in which both applications and user data reside in the cloud: hence Chrome OS primarily runs web applications. Source code and a public demo came that November. The first Chrome OS laptop, known as a Chromebook, arrived in May 2011. Initial Chromebook shipments from Samsung and Acer occurred in July 2011. Chrome OS has an integrated media player and file manager. It supports Progressive Web Apps and Chrome Apps; these resemble native applications, as well as remote access to the desktop. As more Chrome OS machines have entered the market, the operating system is now seldom evaluated apart from the hardware that runs it.Android applications started to become available for the operating system in 2014, and in 2016, access to Android apps in Google Play's entirety was introduced on supported Chrome OS devices. Support for a Linux terminal and applications, known as Project Crostini, was released to the stable channel in 2018 with Chrome OS 69. This was made possible via a lightweight Linux kernel that runs containers inside a virtual machine.
Chrome_OS - Wikipedia, the free encyclopediaYou have been instructed to configure a database server running Windows Server 2022 to alert technicians when the server's processor or memory is running above 75% capacity. Which of the following technologies will help you achieve this?
Performance monitor is a Windows tool that can be used to monitor and log a system's health and status in real time. Task Manager can display similar information but does not log and should only be used as a quick reference.
A system monitor is a hardware or software component used to monitor system resources and performance in a computer systemAmong the management issues regarding use of system monitoring tools are resource usage and privacy
System_Monitor - Wikipedia, the free encyclopediaYour surpervisor asks you to come up with ideas for increasing the physical security in a computer lab used for sensitive projects, which of the following would NOT be an acceptable suggestion?
Encryption is not a physical security measure. Anything regarding access control such as a cypher lock is considered physical security. Video cameras/surveillance are also physical security features, as is controlling access with something you have such as a smart card.
Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment and resources and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks) Physical security involves the use of multiple layers of interdependent systems that can include CCTV surveillance, security guards, protective barriers, locks, access control, perimeter intrusion detection, deterrent systems, fire protection, and other systems designed to protect persons and property
Physical Security - Wikipedia, the free encyclopediaWhich of the following is a command line tool that will translate between a domain name and an IP Address?
NSLOOKUP will return the IP Address of a domain name by querying a computers assigned DNS Servers for the information. NSLOOKUP is well known as a Windows command but can be used on some Unix based systems as well.
nslookup (from name server lookup) is a network administration command-line tool for querying the Domain Name System (DNS) to obtain the mapping between domain name and IP address, or other DNS records.
Nslookup - Wikipedia, the free encyclopediaCertain business focused features like joining an Active Directory domain are not supported in all Windows editions. Windows 7 Home Premium does not include support for joining Active Directory domains.
Which of the following should be regularly performed to prevent data loss in the event of data corruption or drive failure?
Of the options, only Scheduled Backups will prevent data loss after corruption or drive failure.
In information technology, a backup, or data backup is a copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event. The verb form, referring to the process of doing so, is "back up", whereas the noun and adjective form is "backup". Backups can be used to recover data after its loss from data deletion or corruption, or to recover data from an earlier time. Backups provide a simple form of disaster recovery; however not all backup systems are able to reconstitute a computer system or other complex configuration such as a computer cluster, active directory server, or database server.A backup system contains at least one copy of all data considered worth saving. The data storage requirements can be large. An information repository model may be used to provide structure to this storage. There are different types of data storage devices used for copying backups of data that is already in secondary storage onto archive files. There are also different ways these devices can be arranged to provide geographic dispersion, data security, and portability. Data is selected, extracted, and manipulated for storage. The process can include methods for dealing with live data, including open files, as well as compression, encryption, and de-duplication. Additional techniques apply to enterprise client-server backup. Backup schemes may include dry runs that validate the reliability of the data being backed up. There are limitations and human factors involved in any backup scheme.
Backup - Wikipedia, the free encyclopediaWhat technology from Microsoft can be used by system administrators to apply policies and configurations to groups of user accounts and client PCs?
Microsoft Active Directory is a directory service for organizing user accounts, servers and client operating systems. Additionally it provides helpful features like enforcing password policies, running login scripts, applying user account restrictions and much more.
Active Directory (AD) is a directory service developed by Microsoft for Windows domain networks. It is included in most Windows Server operating systems as a set of processes and services. Initially, Active Directory was used only for centralized domain management. However, Active Directory eventually became an umbrella title for a broad range of directory-based identity-related services.A server running the Active Directory Domain Service (AD DS) role is called a domain controller. It authenticates and authorizes all users and computers in a Windows domain type network, assigning and enforcing security policies for all computers, and installing or updating software. For example, when a user logs into a computer that is part of a Windows domain, Active Directory checks the submitted username and password and determines whether the user is a system administrator or normal user. Also, it allows management and storage of information, provides authentication and authorization mechanisms and establishes a framework to deploy other related services: Certificate Services, Active Directory Federation Services, Lightweight Directory Services, and Rights Management Services.Active Directory uses Lightweight Directory Access Protocol (LDAP) versions 2 and 3, Microsoft's version of Kerberos, and DNS.
Active_Directory - Wikipedia, the free encyclopediaA malicious user has gained access to several user accounts by guessing their password. The malicious user was able to guess passwords using a list of commonly used phrases and words. Which of the following terms best describes this type of attack?
A Dictionary Attack uses a list of preset words, phrases and commonly used passwords.
In cryptanalysis and computer security, a dictionary attack is an attack using a restricted subset of a keyspace to defeat a cipher or authentication mechanism by trying to determine its decryption key or passphrase, sometimes trying thousands or millions of likely possibilities often obtained from lists of past security breaches.
Dictionary_attack - Wikipedia, the free encyclopediaTrue or false:
> BranchCache is a feature available to Windows operating systems that allows reading and writing to cached files in the event connectivity is lost to the file server.
BranchCache allows files to be read even when a connection cannot be made with the file server. For example, if a warehouse loses connectivity to the file server in the corporate office hundreds of miles away BranchCache could be used to allow warehouse employees to read locally cached files. BranchCache does not support writing to files unless connectivity to the file server can be established.
Windows 8 has 4 primary editions: Windows 8 (Core), Windows 8 Pro, Windows 8 Enterprise and Windows 8 RT. Windows 8 (Core) is often marketed as simply Windows 8 but many technical docs and other sources refer to it as Core to avoid confusion.
Windows 8, a major release of the Microsoft Windows operating system, was available in four different editions: Windows 8 (Core), Pro, Enterprise, and RT. Only Windows 8 (Core) and Pro were widely available at retailers. The other editions focus on other markets, such as embedded systems or enterprise. All editions except RT support 32-bit IA-32 CPUs and x64 CPUs.
Windows_8_editions - Wikipedia, the free encyclopediaWhich option is a proprietary operating system made by Google for mobile devices like laptops and tablets?
Chrome OS is a proprietary operating system made by Google. It is mostly used on laptops known as Chromebooks. Android is not proprietary, the OS and it's source code can be found online for free. Many Android editions exist, some made by Google some made by others like Samsung or online communities.
Chrome OS (sometimes styled as chromeOS) is a Linux-based operating system designed by Google. It is derived from the free software Chromium OS and uses the Google Chrome web browser as its principal user interface. Unlike Chromium OS, Chrome OS is proprietary software. Google announced the project, then based on Ubuntu, in July 2009, conceiving it as an operating system in which both applications and user data reside in the cloud: hence Chrome OS primarily runs web applications. Source code and a public demo came that November. The first Chrome OS laptop, known as a Chromebook, arrived in May 2011. Initial Chromebook shipments from Samsung and Acer occurred in July 2011. Chrome OS has an integrated media player and file manager. It supports Progressive Web Apps and Chrome Apps; these resemble native applications, as well as remote access to the desktop. As more Chrome OS machines have entered the market, the operating system is now seldom evaluated apart from the hardware that runs it.Android applications started to become available for the operating system in 2014, and in 2016, access to Android apps in Google Play's entirety was introduced on supported Chrome OS devices. Support for a Linux terminal and applications, known as Project Crostini, was released to the stable channel in 2018 with Chrome OS 69. This was made possible via a lightweight Linux kernel that runs containers inside a virtual machine.
Chrome_OS - Wikipedia, the free encyclopediaYou receive an email from an outside party stating that clients on your network have been encrypted and the only way to decrypt them is to send Bitcoins to a hacker named Zero Cool
. Your company has fallen victim to a/an:
A ransomware attack involves encrypting user's data and witholding the encryption key until a ransom is paid. Darn it, Jackal!
Ransomware is a type of malware from cryptovirology that threatens to publish the victim's personal data or perpetually block access to it unless a ransom is paid. While some simple ransomware may lock the system without damaging any files, more advanced malware uses a technique called cryptoviral extortion. It encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them. In a properly implemented cryptoviral extortion attack, recovering the files without the decryption key is an intractable problem – and difficult to trace digital currencies such as paysafecard or Bitcoin and other cryptocurrencies are used for the ransoms, making tracing and prosecuting the perpetrators difficult. Ransomware attacks are typically carried out using a Trojan disguised as a legitimate file that the user is tricked into downloading or opening when it arrives as an email attachment. However, one high-profile example, the WannaCry worm, traveled automatically between computers without user interaction.Starting as early as 1989 with the first documented ransomware known as the AIDS trojan, the use of ransomware scams has grown internationally. There were 181.5 million ransomware attacks in the first six months of 2018. This record marks a 229% increase over this same time frame in 2017. In June 2014, vendor McAfee released data showing that it had collected more than double the number of ransomware samples that quarter than it had in the same quarter of the previous year. CryptoLocker was particularly successful, procuring an estimated US$3 million before it was taken down by authorities, and
Ransomware - Wikipedia, the free encyclopediaWired Equivalent Privacy (WEP) is a deprecated wireless security standard. It has been superseded by WPA and WPA2 which are stronger more secure options (WPA2 should be used when possible). A number of successful attacks exist to gain access to WEP based wireless networks.
Wired Equivalent Privacy (WEP) was a security algorithm for 802.11 wireless networks. Introduced as part of the original IEEE 802.11 standard ratified in 1997, its intention was to provide data confidentiality comparable to that of a traditional wired network. WEP, recognizable by its key of 10 or 26 hexadecimal digits (40 or 104 bits), was at one time widely used, and was often the first security choice presented to users by router configuration tools.In 2003, the Wi-Fi Alliance announced that WEP had been superseded by Wi-Fi Protected Access (WPA). In 2004, with the ratification of the full 802.11i standard (i.e. WPA2), the IEEE declared that both WEP-40 and WEP-104 have been deprecated.WEP was the only encryption protocol available to 802.11a and 802.11b devices built before the WPA standard, which was available for 802.11g devices. However, some 802.11b devices were later provided with firmware or software updates to enable WPA, and newer devices had it built in.
Wired_Equivalent_Privacy - Wikipedia, the free encyclopediaOf which of the following Windows System Power States saves the contents of memory to a file on the PC's hard drive?
Sleep, Hibernation, and Stand By are the only true System Power States. Of the three, only hibernation provides no power to memory, and saves memory contents to the hard drive to be loaded back into memory when the computer wakes up.
Hibernation (also known as suspend to disk, or Safe Sleep on Macintosh computers) in computing is powering down a computer while retaining its state. When hibernation begins, the computer saves the contents of its random access memory (RAM) to a hard disk or other non-volatile storage. When the computer is turned on the RAM is restored and the computer is exactly as it was before entering hibernation. Hibernation was first implemented in 1992 and patented by Compaq Computer Corporation in Houston, Texas. As of 2020, Microsoft's Windows 10 employs a type of hibernation by default when shutting down.
Hibernation_(computing) - Wikipedia, the free encyclopediaWindows 8 and 8.1 64-bit support a maximum of 128GB of memory. Other Windows 8 editions go as high as 512GB. This is a limit imposed by Microsoft and not a limit with 64-bit operating systems. In theory a 64-bit operating system can go as high as 16 Exabytes!
An unknown device has been found on a SOHO wireless router. Which of the following is BEST to perform to keep this device off the network?
Configuring MAC Filtering will only allow approved MAC Addresses to connect to the router. This is the BEST option of those given, CompTIA questions are often worded like this. In reality the best option would be to change the WiFi password and verify the encryption settings first, but this was not an option.
In computer networking, MAC Filtering refers to a security access control method whereby the MAC address assigned to each network card is used to determine access to the network. MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and whitelists. While the restriction of network access through the use of lists is straightforward, an individual person is not identified by a MAC address, rather a device only, so an authorized person will need to have a whitelist entry for each device that they would like to access the network. While giving a network some additional protection, MAC filtering can be circumvented by using a packet analyzer to find a valid MAC and then using MAC spoofing to access the network using that address. MAC address filtering can be considered as security through obscurity because the effectiveness is based on "the secrecy of the implementation or its components".
MAC_filtering - Wikipedia, the free encyclopediaA technician is trying to setup a non-domain user account on a workstation, but receives the following error message "Password does not meet the complexity requirements." Which of the following utilities should the technician use to identify the criteria?
Because this is a non-domain (local) user account the Local Security Policy is the cause of the issue. Accessing the policy to determine account requirements will solve the problem.
Group Policy is a feature of the Microsoft Windows NT family of operating systems (including Windows 7, Windows 8.1, Windows 10, Windows 11, and Windows Server 2003+) that controls the working environment of user accounts and computer accounts. Group Policy provides centralized management and configuration of operating systems, applications, and users' settings in an Active Directory environment. A set of Group Policy configurations is called a Group Policy Object (GPO). A version of Group Policy called Local Group Policy (LGPO or LocalGPO) allows Group Policy Object management without Active Directory on standalone computers.Active Directory servers disseminate group policies by listing them in their LDAP directory under objects of class groupPolicyContainer. These refer to fileserver paths (attribute gPCFileSysPath) that store the actual group policy objects, typically in an SMB share \\domain.com\SYSVOL shared by the Active Directory server. If a group policy has registry settings, the associated file share will have a file registry.pol with the registry settings that the client needs to apply.The Policy Editor (gpedit.msc) is not provided on Home versions of Windows XP/Vista/7/8/8.1/10/11.
Group_Policy - Wikipedia, the free encyclopediaLooks like thats it! You can go back and review your answers or click the button below to grade your test.