A+ 1102 Study Quiz 2

A+ 1102 Study Quiz 2

Professional Development

45 Qs

quiz-placeholder

Similar activities

1102 Quiz 2

1102 Quiz 2

Professional Development

50 Qs

Test Mendix 3

Test Mendix 3

Professional Development

50 Qs

9628-09 City & Guilds Level 3 Award in Coding and Logic Quiz 3

9628-09 City & Guilds Level 3 Award in Coding and Logic Quiz 3

11th Grade - Professional Development

50 Qs

Sec+ 701 Final Review Quiz

Sec+ 701 Final Review Quiz

Professional Development

50 Qs

Netrust Freshers Battery Exam

Netrust Freshers Battery Exam

Professional Development

40 Qs

70-742 Test 3

70-742 Test 3

Professional Development

44 Qs

Comptia A+ Core 1 Pt.1

Comptia A+ Core 1 Pt.1

University - Professional Development

50 Qs

1102 Quiz 3

1102 Quiz 3

Professional Development

50 Qs

A+ 1102 Study Quiz 2

A+ 1102 Study Quiz 2

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Pat Johnson

Used 4+ times

FREE Resource

45 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An incident handler needs to preserve evidence for possible litigation. Which of the following will the incident handler MOST likely do to preserve the evidence?

Encrypt the files.

Clone any impacted hard drives.

Contact the cyber insurance company.

Inform law enforcement.

Answer explanation

Cloning impacted hard drives preserves evidence without altering original data, crucial for possible litigation purposes.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technician needs to recommend the best backup method that will mitigate ransomware attacks. Only a few files are regularly modified; however, storage space is a concern. Which of the following backup methods would BEST address these concerns?

Full

Differential

Off-site

Grandfather-father-son

Answer explanation

The best backup method to mitigate ransomware attacks while considering storage space and few modified files is the Differential backup method, as it only backs up the files that have changed since the last full backup.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions?

Avoid distractions

Deal appropriately with customer's confidential material

Adhere to user privacy policy

Set and meet timelines

Answer explanation

The technician's action of setting the phone to silent shows that they are avoiding distractions, which is the best description of their actions in this scenario.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technician needs to transfer a large amount of files over an unreliable connection. The technician should be able to resume the process if the connection is interrupted. Which of the following tools can be used?

fsck

chkdsk

git clone

robocopy

Answer explanation

robocopy allows for the transfer of a large number of files over an unreliable connection and can resume the process if interrupted.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company installed a new backup and recovery system. Which of the following types of backups should be completed FIRST?

Full

Without parity

Differential

Incremental

Answer explanation

The first backup to be completed should be a Full backup to ensure all data is initially saved before proceeding with other types of backups.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The use of data from a user's smartphone is considerably higher than average. The user suspects that an installed app is transmitting data in the background. The user would like to be alerted when an app tries to communicate with the internet. Which of the following is the BEST solution for the user's concern?

Operating system updates

Remote wipe

Antivirus

Firewall

Answer explanation

A firewall is the BEST solution as it can monitor and control app communication with the internet, helping the user identify data-hungry apps.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technician has been tasked with installing a workstation that will be used for point-of-sale transactions. The point-of-sale system will process credit cards and loyalty cards. Which of the following encryption technologies should be used to secure the workstation in case of theft?

Data-in-transit encryption

File encryption

USB drive encryption

Disk encryption

Answer explanation

Disk encryption should be used to secure the workstation in case of theft as it encrypts the entire disk, protecting all data stored on it.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?