A+ 1102 Study Quiz 2

A+ 1102 Study Quiz 2

Professional Development

45 Qs

quiz-placeholder

Similar activities

IT Certification Exam Study Guide

IT Certification Exam Study Guide

Professional Development

45 Qs

Printers Troubleshooting

Printers Troubleshooting

Professional Development

50 Qs

Comptia A+ Core 1 Pt.1

Comptia A+ Core 1 Pt.1

University - Professional Development

50 Qs

A+ 1102 Study Quiz 4

A+ 1102 Study Quiz 4

Professional Development

44 Qs

A+ 1101 Study Quiz 1

A+ 1101 Study Quiz 1

Professional Development

46 Qs

What is OS?

What is OS?

Professional Development

40 Qs

9628-09 City & Guilds Level 3 Award in Coding and Logic Quiz 3

9628-09 City & Guilds Level 3 Award in Coding and Logic Quiz 3

11th Grade - Professional Development

50 Qs

Lesson 17 Vocab

Lesson 17 Vocab

Professional Development

43 Qs

A+ 1102 Study Quiz 2

A+ 1102 Study Quiz 2

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Pat Johnson

Used 4+ times

FREE Resource

45 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An incident handler needs to preserve evidence for possible litigation. Which of the following will the incident handler MOST likely do to preserve the evidence?

Encrypt the files.

Clone any impacted hard drives.

Contact the cyber insurance company.

Inform law enforcement.

Answer explanation

Cloning impacted hard drives preserves evidence without altering original data, crucial for possible litigation purposes.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technician needs to recommend the best backup method that will mitigate ransomware attacks. Only a few files are regularly modified; however, storage space is a concern. Which of the following backup methods would BEST address these concerns?

Full

Differential

Off-site

Grandfather-father-son

Answer explanation

The best backup method to mitigate ransomware attacks while considering storage space and few modified files is the Differential backup method, as it only backs up the files that have changed since the last full backup.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions?

Avoid distractions

Deal appropriately with customer's confidential material

Adhere to user privacy policy

Set and meet timelines

Answer explanation

The technician's action of setting the phone to silent shows that they are avoiding distractions, which is the best description of their actions in this scenario.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technician needs to transfer a large amount of files over an unreliable connection. The technician should be able to resume the process if the connection is interrupted. Which of the following tools can be used?

fsck

chkdsk

git clone

robocopy

Answer explanation

robocopy allows for the transfer of a large number of files over an unreliable connection and can resume the process if interrupted.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company installed a new backup and recovery system. Which of the following types of backups should be completed FIRST?

Full

Without parity

Differential

Incremental

Answer explanation

The first backup to be completed should be a Full backup to ensure all data is initially saved before proceeding with other types of backups.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The use of data from a user's smartphone is considerably higher than average. The user suspects that an installed app is transmitting data in the background. The user would like to be alerted when an app tries to communicate with the internet. Which of the following is the BEST solution for the user's concern?

Operating system updates

Remote wipe

Antivirus

Firewall

Answer explanation

A firewall is the BEST solution as it can monitor and control app communication with the internet, helping the user identify data-hungry apps.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technician has been tasked with installing a workstation that will be used for point-of-sale transactions. The point-of-sale system will process credit cards and loyalty cards. Which of the following encryption technologies should be used to secure the workstation in case of theft?

Data-in-transit encryption

File encryption

USB drive encryption

Disk encryption

Answer explanation

Disk encryption should be used to secure the workstation in case of theft as it encrypts the entire disk, protecting all data stored on it.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?