A+ 1102 Study Quiz 2

A+ 1102 Study Quiz 2

Professional Development

45 Qs

quiz-placeholder

Similar activities

Quiz#1 Modulo Diseño Web

Quiz#1 Modulo Diseño Web

Professional Development

40 Qs

ITIL 4-Practice Test 1

ITIL 4-Practice Test 1

Professional Development

40 Qs

AZ-900 MÓDULO 01

AZ-900 MÓDULO 01

Professional Development

47 Qs

Evaluación Diagnótica

Evaluación Diagnótica

Professional Development

40 Qs

COPA Revision Test 1

COPA Revision Test 1

4th Grade - Professional Development

40 Qs

Seguridad examen 2 (3 y 4)

Seguridad examen 2 (3 y 4)

Professional Development

42 Qs

REDES1

REDES1

University - Professional Development

50 Qs

Reti, internet e servizi

Reti, internet e servizi

Professional Development

50 Qs

A+ 1102 Study Quiz 2

A+ 1102 Study Quiz 2

Assessment

Quiz

Computers

Professional Development

Practice Problem

Hard

Created by

Pat Johnson

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

45 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An incident handler needs to preserve evidence for possible litigation. Which of the following will the incident handler MOST likely do to preserve the evidence?

Encrypt the files.

Clone any impacted hard drives.

Contact the cyber insurance company.

Inform law enforcement.

Answer explanation

Cloning impacted hard drives preserves evidence without altering original data, crucial for possible litigation purposes.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technician needs to recommend the best backup method that will mitigate ransomware attacks. Only a few files are regularly modified; however, storage space is a concern. Which of the following backup methods would BEST address these concerns?

Full

Differential

Off-site

Grandfather-father-son

Answer explanation

The best backup method to mitigate ransomware attacks while considering storage space and few modified files is the Differential backup method, as it only backs up the files that have changed since the last full backup.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions?

Avoid distractions

Deal appropriately with customer's confidential material

Adhere to user privacy policy

Set and meet timelines

Answer explanation

The technician's action of setting the phone to silent shows that they are avoiding distractions, which is the best description of their actions in this scenario.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technician needs to transfer a large amount of files over an unreliable connection. The technician should be able to resume the process if the connection is interrupted. Which of the following tools can be used?

fsck

chkdsk

git clone

robocopy

Answer explanation

robocopy allows for the transfer of a large number of files over an unreliable connection and can resume the process if interrupted.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company installed a new backup and recovery system. Which of the following types of backups should be completed FIRST?

Full

Without parity

Differential

Incremental

Answer explanation

The first backup to be completed should be a Full backup to ensure all data is initially saved before proceeding with other types of backups.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The use of data from a user's smartphone is considerably higher than average. The user suspects that an installed app is transmitting data in the background. The user would like to be alerted when an app tries to communicate with the internet. Which of the following is the BEST solution for the user's concern?

Operating system updates

Remote wipe

Antivirus

Firewall

Answer explanation

A firewall is the BEST solution as it can monitor and control app communication with the internet, helping the user identify data-hungry apps.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technician has been tasked with installing a workstation that will be used for point-of-sale transactions. The point-of-sale system will process credit cards and loyalty cards. Which of the following encryption technologies should be used to secure the workstation in case of theft?

Data-in-transit encryption

File encryption

USB drive encryption

Disk encryption

Answer explanation

Disk encryption should be used to secure the workstation in case of theft as it encrypts the entire disk, protecting all data stored on it.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?