Professor Messer Comptia A+ 1002
66 community-sourced questions and answers. Free — no login.
A user has reported an internal website displaying a message that the site is not trusted. Which of the following is the MOST likely reason for this issue? A) User's time and date is incorrect B) The network is down C) A Windows update is pending D) The user account is locked out E) The BIOS is disabled
A) User's date and time is incorrect The correct date and time is required to properly evaluate the expiration date of a web server certificate.
An application was hung on the desktop and will not respond to any input. Which of these would be the best way to terminate this application? A) Services B) Task Manager C) System Properties D) Application Repair E) Windows Update
B) Task Manager Task Manager can be used to view the status of applications of administratively halt their execution
An application has crashed on a user's workstation multiple times a day for the past week. Which of the following would provide some additional information about each of these crashers? A) Task Manager B) Performance Monitor C) Event Viewer D) System Configuration E) UEFI BIOS
C) Event Viewer The Windows Event Viewer maintains a log of all system events.
Which of the following would be the BEST way to keep unauthorized users from accessing a wireless network? A) Network Access Control B) Mac Filtering C) Static IP addressing D) Disable SSID broadcasts E) Spanning tree protocol
A) Network Access Control (NAC) Can be used to provide authentication and management of network connections. A user would need to properly authenticate before network access is granted.
A system administrator would like to reuse a hard drive in a new system but wants to be sure that none of the previous information is recoverable. Which of the following would be the best way to accomplish this? A) Quick Format B) Degaussing C) Regular format D) Incineration E) Drill
C) Regular format In Windows, a regular format will overwrite each sector with zeros to ensure that none of the data can be recovered later
A system administrator would like to prevent users from changing the boot drive on their computer. Which of the following would provide this feature? A) Group policy B) UEFI configuration C) BCD settings D) NTFS permissions E) Group membership
B) UEFI configuration The UEFI BIOS configuration determines which drives are prioritized during the boot process
The Windows file permissions for a client directory are automatically assigned from the parent folder permissions. Which of the following would describe these access rights? A) Inherited B) Administrative C) Share D) Explicit E) EFS
A) Inherited Inherited permissions are derived from the parent folder and are not explicitly assigned
Which of the following would BEST describe a zero-day attack? A) Internet bandwidth is overloaded B) Passwords are hashed and salted C) A duplicate MAC address is used to circumvent security controls D) An attacker walks into a controlled area behind a legitimate user D) Fully patched systems are exploited
E) Fully patched systems are exploited A zero-day attack takes advantage of a vulnerability that has not previously been identified or patched
Firewall logs have identified a workstation sending information to a known malicious site ever sixty seconds. Which of the following would be the MOST likely reason for this log information? A) Monthly security patches B) Botnet infection C) Invalid BIOS configuration D) Incorrect default gateway E) False positive
B) Botnet infection Botnets operate by contacting a command and control (C&C) server to obtain the latest orders.
A caller to the help desk is pressuring the technician to complete the task quickly without performing the normal verification. Which of the following would BEST describe this characteristic? A) Authority B) Familiarity C) Consensus D) Urgency E) Trust
D) Urgency The social networking principle of urgency encourages the victim to act quickly without thinking about the details of task.
Which of the following would be the BEST way to prevent users from visiting known malicious web sites? A) Windows Recovery Environment B) Secure DNS services C) Scheduled patches D) UEFI BIOS E) Windows Backup and Restore
B) Secure DNS Services A secure DNS service can provide real-time domain blocking and prevent users from visiting harmful web sites.
A network administrator would like to allow access to the wireless network using a centralized authentication method. Which of the following options would provide this functionality? A) WPA2 B) 802.1X C) AES D) PSK E) CCMP
B) 802.1X The 802.1X standard provide a way to authenticate users to a centralized database using RADIUS, TACACS+, Kerberos, or other authentication protocols
A system administrator suspects that a computer may be infected with malware. Which of the following would be the BEST next step in the malware removal process? A) Educate the end user B) Disable System Restore C) Schedule scans D) Quarantine the system E) Scan and remove
D) Quarantine the system The first step before proceeding with the malware removal process is to verify that the computer cannot communicate with any other systems
A system administrator has identified a system that is sending unsolicited information to an external web site. Which of the following would the BEST description of this malware? A) Keylogger B) Virus C) Rootkit D) Bootnet E) Worm
D) Botnet A device participating in a botnet is under the control of a third-party and is often used to participate in online attacks
Which of the following would be the best way to limit access to a laptop OS? A) Smart card B) Cable lock C) Privacy filter D) USB lock E) ID Badge
A) Smart card A smart card can be used as an authentication factor, and often works in conjunction with a PIN (Personal Identification Number)
A Linux administrator is searching for a specific piece of text in a large log file. Which of the following would help them complete this task? A) dd B) chmod C) apt-get D) grep E) su
D) grep The grep utility can quickly search through files to find a specific piece of information
A Linux administrator is remotely connecting to the command line of another device. Which of these is the Linux adminstrator using? A) terminal B) dd C) mv D) grep E) chmod
A) Terminal The terminal-utility provides a command-line interface for accessing local or remote devices
A Linux administrator is using the apt-get utility on their server. Which of the following would describe this task? A) Schedule backups B) Securely connect to a remote device C) Perform a software update D) Shut down the computer E) Transfer log files
C) Perform a software update The apt-get command is a common method of updating software packages on a Linux device.
A malware infection has targeted the stored usernames and passwords on a macOS workstation. Where would the malware obtain this information? A) Mission Control B) Prefs files C) Registry D) Spotlight E) Keychain
E) Keychain The Keychain integrates password management and all certificates into macOS. All saved passwords are saved in the Keychain
A macOS user needs to use a command line utility. Which of the following would be the best choice for this task? A) CMD B) Terminal C) Prompt D) Pages E) Console
B) Terminal The Terminal utility is a built-in command line feature of macOS
A system administrator needs to restore a deleted file from a macOS system. Which of the following would be the BEST choice for this task? A) Finder B) System Protection C) Restorer D) Disk Utility E) Time Machine
E) Time Machine The Time Machine utility provides ongoing backups for macOS
A user is having slower than normal network throughput on their tablet. Which of the following should be their FIRST troubleshooting step? A) Upgrade the tablet OS B) Run a Wifi bandwidth test C) Disable Bluetooth D) Charge the battery E) Uninstall all non-standard apps
B) Run a Wifi bandwidth test Before making any changes or configurations or operating systems, it's useful to run a test to determine how much bandwidth can be utilized by a device.
Which of the following would assist a system administrator with patch deployment during non-working hours? A) WoL B) DHCP C) QoS D) APIPA E) 802.1X
A) WoL WoL (Wake on LAN) allows a system administrator to remotely start a system that may be powered off or hibernating
A user has connected their laptop to the network and received an IP address of 169.254.52.17. Which of the following would BEST describe this configuration? A) DHCP B) VPN C) Static D) Loopback E) APIPA
E) APIPA The APIPA (Automatic Private IP Addressing) addressing range is between 169.254.1.0 and 169.254.254.255
A user often takes their laptop to a wireless network that does not provide DHCP. Which of these settings would provide configuration options when DHCP is not available? A) VPN B) Windows Firewall C) Proxy Settings D) Alternate Configuration E) Device Manager
D) Alternate Configuration The Alternate Configuration tab in the IPv4 properties is used to select the options if a DHCP (Dynamic Host Configuration Protocol) server is unavailable
A Windows administrator needs to configure an IP address and port number for a proxy server. Which of the following would provide this configuration option? A) Internet Properties B) Remote Acess C) Computer Management D) Adapter Settings E) Windows Firewall
A) Internet Properties Proxy server and LAN configurations can be found in the Windows control Panel under Internet Properties
To change their password, a user must update their credentials on each computer on the local network. Which of the following would describe this network type? A) Windows Domain B) Screened subnet C) HomeGroup D) VPN E) Workgroup
E) Workgroup A Windows Workgroup maintains login credentials separately on each computer
An administrator is using the Windows System Properties applet. Which of the following task would be BEST suited for this applet? A) Disable System Restore B) Reset the print spooler C) Modify the monitor resolution D) Clear the browser cache E) Delete a saved password
A) Disable System Restore The System Protection tab in System Properties can be used to enable and disable the System Restore feature
A system administrator needs to connect to the desktop of a remote Windows computer. Which of the following would be the BEST choice for this task? A) msinfo32 B) Windows Explorer C) mstsc D) dxdiag E) Component Manager
c) mstsc The Microsoft Terminal Services Client or mstsc, is the client used for connecting to another Windows device using Remote Desktop Protocol
Which of the following Windows 10 utilities would be the BEST choice for enabling/disabling startup applications? A) System Configuration B) Device Manager C) Event Viewer D) Task Manager E) Component Manager
D) Task Manager The Startup tab in System Configuration has been moved to the Task Manager in Windows 10
A system administrator would like to remove the driver associated with a wireless keyboard. Which of the following would be the BEST choice for this task? A) Component Services B) Event Viewer C) Performance Manager D) ODBC Data Sources E) Device Manager
E) Device Manager The Device Manager utility provides a way to add, remove, and manage device drivers
A network administrator would like to verify that a specific database server is connected to the network. Which of the following would be the BEST choice for this task? A) tracert B) netstat C) nslookup D) ping E) net view
D) ping The ping command is commonly used to send and receive echo packets from a remote device
A server administrator is modifying the device drivers available inside of a WIM file. Which of the following should be used to perform this change? A) gpupdate B) nslookup C) dism D) nfc E) robocopy
C) dism The DISM (Deployment Image Servicing and Management) tool is used to modify the contents of WIM (Windows Imaging Format) files
Which of the following can be upgraded in-place of Windows 10 Enterprise A) Windows 7 Home Premium B) Windows 7 Professional C) Windows 8.1 Core D) Windows 7 Home Basic E) Windows 8.1 Ultimate
B) Windows 7 Professional Windows 7 Professional provides a direct upgrade path to Windows 10 Pro and Windows 10 Enterprise
A desktop administrator is trouble shooting the hard drive of a server that uses three primary partitions and one extended partition. Which of the following would BEST describe this configuration? A) MBR B) exFAT C) NTFS D) GPT E) NFS
A) MBR The MBR partition style allows a maximum of four primary partitions, and one of those can be replaced with an extended partition containing logical partitions
A company is concerned about users visiting non-business web sites. Which of the following would set policies for system use? A) NDA B) AUP C) IPS D) TPM E) UEFI
B) AUP An acceptable use policy (AUP) is used by an organization to document and manage the use of technology
A company needs to encrypt all of the data on their laptop computers. Which of the following would be the BEST choice for this requirement? A) BitLocker B) WPA2 C) EFS D) BranchCache E) WPS
A) BitLocker BitLocker provides FDE (Full Disk Encryption) for Windows operating systems
Which of the following CPU specifications are required for Windows 10? A) NX processor bit B) Multiple cores C) L3 cache D) Multithreading E) LGA socket
A) NX processor bit The NX processor bit is a CPU hardware feature to protect against malicious software and it is required to support Windows 10
Which of the following would be included with Windows 7 Home Premium? A) BitLocker B) ICS C) Active Directory D) EFS E) BranchCache
B) ICS Windows 7 Home Premium includes ICS (Internet Connection Sharing), but does not include advanced encryption services or Active Directory connectivity.
A user's mobile phone randomly emits the sound of the camera shutter activating. Which of the following would be the BEST way to troubleshoot this issue? A) Replace the batteries B) Upgrade the camera app C) Change the lock screen passcode D) Mute the system audio E) Run an anti-malware scan
E) Run an anti-malware scan Malware on a mobile device can control many aspects of the operating system, including the camera. An anti-malware scan can test for the presence of this malicious software.
When starting an app on an iOS tablet, the title screen is shown but immediately disappears and the app terminates. Which of the following should be the FIRST troubleshooting step for resolving this issue? A) Reinstall iOS B) Restart the tablet C) Replace the batteries D) Reboot the wireless router E) Update the app
B) Restart the tablet Restarting the tablet can solve issues relating to the operating system without making any functional changes to the app or the OS.
A system administrator has removed malware and scheduled scans on a user's workstation. Which of the following tasks should be performed prior to educating the end user? A) Update anti-virus signatures B) Enable System Protection C) Restart in Safe Mode D) Quarantine the system E) Run the SFC utility
B) Enable System Protection System Protection is disabled earlier in the malware removal process, so this feature needs to be re-enabled before completing the removal
A user's Windows application has crashed multiple times during the workday. Which of the following can be used to view the errors associated with the crashes? A) Task Manager B) Event Viewer C) /var/log D) SFC E) Safe Mode
B) Event Viewer The Windows Event Viewer contains detailed logs and messages regarding system operations.
A Windows 10 computer is showing the message 'Missing operating system' during startup. Which of the following would be the best way to resolve this issue? A) Configure the BCD store B) Run Reliability Monitor C) Install BitLocker D) Run a printer test page E) Disable all startup apps
A) Configure the BCD store The BCD (Boot Configuration Data) store contains information on where the Windows operating system is located on the storage drive.
When logging into the corporate wireless network, a user is prompted for their login credentials. Which of the following provides this functionality? A) MAC filtering B) 802.1X C) WPS D) DHCP E) Content filtering
B) 802.1X 802.1X is the standard for NAC or Network Access Control. The access point will query a central login database to check the user's login credentials
The data on a hard drive was removed, and the drive was moved to a different computer. The owner of the new computer has now recovered data from the previous system. Which of the following was MOST likely used to remove the original data? A) Low-level format B) Degauss C) Quick format D) BitLocker E) Shredder
C) Quick format A quick format will remove the index to the files, but the original data will still be recoverable on the drive
A system administrator would like to additional security when unlocking a mobile device. Which of the following would be the BEST way to provide this functionality? A) Swipe pattern B) GPS location C) App store verification D) Built-in certificate E) Cloud backup
A) Swipe pattern A local authentication method such as a biometric, swipe pattern, or face recognition would provide additional security when unlocking the device.
An older Windows desktop has been configured to play MP3 audio files when a flash drive is connected. Which of the following would disable this feature? A) AutoPlay B) Windows Start C) SSO D) UEFI Autorun D) AD groups
A) AutoPlay AutoPlay is a feature that automatically started playing media when a removable drive was connected.
Which of the following would be the BEST way to encrypt a group of files in a Windows folder? A) BitLocker B) SSO C) Disk Management D) UPnP E) EFS
E) EFS EFS (Encrypting File System) is an NTFS feature that allows for the encryption of individual files or folders
An attacker was able to gain access to a fully patched email server using an exploit that had not previously been seen before. Which of the following would BEST describe this attack? A) Social Engineering B) Brute force C) Zero-day D) Spoofing E) DoS
C) Zero-day A zero-day attack exploits a vulnerability that has not yet been detected or published.
A third-party has used a know vulnerability to create a reboot loop in your Internet router. Which of the following would BEST describe this attack? A) DoS B) Zero-day C) Brute force D) Phishing E) Spoofing
A) DoS A DoS (Denial of Service) describes the process of forcing a service to fail
Which of the following would be the BEST way to disable Windows service before the system starts? A) Hold the shift key during boot B) System configuration C) BIOS configuration D) Device Manager E) Windows Recovery Environment
E) Windows Recovery Environment The Windows Recovery Environment can be used to access the file system and change configurations before the OS boots
A company has been infected with a malware that was able to replicated itself across every database server without any user intervention. Which of the following would BEST describe this malware? A) Rootkit B) Virus C) Worm D) Keylogger E) Crypto-malware
C) Worm A worm is a type of malware that can replicate itself between systems without human intervention
A system administrator has identified an access point that uses TKIP. Which of the following would MOST likely be associated with this configuration? A) WPA2 B) TACACS C) WEP D) RADIUS E) WPA
E) WPA WPA used the RC4 protocol with TKIP (Temporary Key Integrity Protocol).
Which of the following is commonly used to limit access to a wireless network? A) Host-based firewall B) STP C) Smart card D) MAC filter E) Anti-malware
D) MAC filter A MAC (Media Access Control) filter is one of the controls commonly available on a wireless access point
A Linux administrator would like to configure a user's access to a file as read-only. Which of the following would provide this configuration setting? A) chmod B) passwd C) su D) vi E) ps
A) chmod The chmod (change mode) command can be used to set the read, write, and execute to a file system object.
Which of these utilities would be the best choice for working at Linux command line? A) dd B) rsync C) VNC D) Terminal E) CMD
D) Terminal The terminal utility is commonly used to access the Linux command line.
Which of the following would be the BEST choice for updating a Linux utility? A) apt-get B) tar C) grep D) chmod E) rsync
A) apt-get The apt-get (Advanced Package Tool Get) utility can be used on many Linux distributions for application installation and updates
Which of the following macOS features can be used to manage multiple desktops? A) Gestures B) Finder C) Spaces D) Dock E) Boot Camp
C) Spaces macOS can support multiple desktop configurations using Mission Control and Spaces
A hard drive in a macOS computer has failed, and the user needs to recover the operating system and personal files to a new SSD. Which of the following would provide this functionality? A) Mission Control B) Terminal C) Disk Utility D) Keychain Access E) Time Machine
E) Time Machine The Time Machine utility provides ongoing backups for all files on a macOS storage drive
What are the two critical boot files that risk corruption in Windows? A) bootmgr and bcd B) bcd and mbr C)bootmgr and boot.ini D) boot.ini and fixboot
A) bootmgr and bcd
Which command repairs the master boot record, boot sector, or BCD store? A) fixboot B) scanos C) bootrec D) fixmbr
C) bootrec
A company is replacing all of the batteries in their UPS units. Which of the following would be the BEST way to dispose of the old batteries? A) Return to the manufacturer B) Deliver to a hazardous waste facility C) Degauss the batteries and discard D) Use the normal trash disposal E) Add to the recycle bin
B) Deliver to a hazardous waste facility The chemicals in batteries should be carefully handled to avoid spills and should be delivered to a local hazardous waste facility
A system administrator has rolled back a recent update to a VM with a single mouse click in the hypervisor. Which of the following would describe this recovery process? A) Incremental backup B) Low level format C) SaaS D) File level bakcup E) Snapshot
E) Snapshot Taking a snapshot of a virtual machine allows the administrator to easily revert the system to the point of the snapshot
A system administrator has followed the change management process and performed an upgrade to the email server. Which of the following would be the LAST step in this process? A) Perform a risk analysis B) Create a backout plan C) Determine the scope of the change D) Document the changes E) Get end-user approval
D) Document the changes The last step of the change management process is updating documentation and knowledgebase information
Which of the following would provide the best method of removing spikes from a computer's power source? A) Auto-switching power supply B) Loopback cable C) Mutlimeter D) ESD strap E) Surge suppressor
E) Surge suppressor A surge suppressor will divert spikes of power into the electrical ground.
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials