A customer complains that he is continuously receiving e-mail responses to things he never sent. What happened to his computer system?
Malware has hijacked his e-mail account and is now sending e-mail through his account. These messages could also be a result of spoofing or phishing, but those are not answer choices.
A user calls the hotline to ask where he might see his Linux system's error logs. On a Linux system, what is the most common location for these files?
Most releases of Linux store error files in the /var/log directory.
A customer called and asked to view all the current logs on his Winodws system. What program would allow users to look at logs?
The Event Viewer not only displays the events running but also errors, log files, and system warnings, which are all very useful in troubleshooting.
You've just successfully removed all viruses from a computer system. The seventh and last step in CompTIA A+'s "Best Practice for Removing Malware" is ____, according to CompTIA A+ specifications.
The final step in the best practices for removing malware would be to educate the end users. Inform them of any company policies regarding email and Internet usage.
A user claims that his hard drive is running very slowly and is affecting the system's performance. The hard drive is less than half full, according to him. What recommendations do you have for speeding up his hard drive?
There is a good chance that the files on his drive have become fragmented. The user should defragment the drive, unless he is using a solid-state drive (SSD), which should never be defragmented.
A user receives a notification stating "Limited Connectivity" after connecting to a new wireless network. What could be the source of this issue?
Limited connectivity is a type of network issue that occurs when the computer can see the network, but there is an issue with the connection. One common cause of this issue is when the computer isn’t getting an IP address from a DHCP server.
A client requests access to the system registry file in order to read, search, or even alter it. What suggestions do you have?
Regedit allows users to view, search, and edit the system registry file. Be certain to explain to the client the issues with editing the registry.
What is the first step you should do to remove malware according to best practices?
The best practice for the removal of malware is to perform these steps in order: 1. identify and research malware symptoms 2. quarantine infected system 3. disable system restore 4. remediate infected systems 5. schedule scans and run updates 6. enable system restore 7. educate the end user.
Although a user has successfully set up dual displays on his computer, the mouse does not track correctly from one screen to the next. Describe the procedure for resolving this problem.
The monitors must be realigned. Right-click on desktop and select Display Settings, drag the screens to properly orient them so the mouse will track from screen to screen in normal order.
Which of the following is a packet-oriented mobile data standard on the worldwide system for mobile communications of the 2G and 3G cellular communication networks that offers moderate-speed data transfer?
Correct answer: GPRS
GPRS, commonly known as GSM-IP, is a General Packet Radio Service that operates on a mobile network using IP transmissions.
What technique would you use to avoid eavesdropping if you were seated in a coffee shop with WiFi and wanted to utilize their WiFi to browse the Internet but were concerned about someone listening on this unsecured connection?
Correct answer: VPN
A VPN is a virtual private network that encrypts data between your client and the VPN server is the technology that is utilized to establish a secure tunnel.
What type of account do you need to link your mobile device to Workspace (previously G Suite)?
Correct answer: Google account
A Google account that offers free consumer, premium enterprise, and non-profit Education services is required to provide synchronization and other services to Google Workspace (previously G Suite). The official term for the set of programs like as Gmail, Hangouts, Docs, Sheets, and so on is Google Workspace. This name change was part of a rebranding effort that began in late 2020.
Which of the following cannot be utilized on an Apple device, allows you to increase the storage capacity of your cell phone?
Correct answer: microSD card
MicroSD cards may be used to extend the storage capacity of your cell phone, but they are not presently accessible on Apple devices.
Which mobile communications technology allows two portable devices to connect wirelessly at a range of roughly 2 inches, provides encryption, and is becoming a highly popular way of transmitting payments via a smartphone?
Correct answer: NFC
NFC is the technology that enables some of the most popular mobile payment systems, such as Apple Pay and Android Pay. This is a short range technology that only works in a certain place, similar to holding the phone up to a supermarket checkout machine.
Mark, a colleague at your company, approaches you and asks you to recommend a mobile device for reading books on the move. Which of the following devices would you recommend?
Correct answer: E-reader
E-readers were designed with book readers in mind, allowing users to download electronic books wirelessly while on the road. It is less cumbersome than lugging a physical book about, and it is frequently less expensive to purchase an electronic copy of the book as well.
A mobile device mostly used to measure how many steps you have taken during the day?
Correct answer: Fitness Monitor
This type of wearable technology may provide you with a wealth of fitness-related information. It can monitor your heart rate, distance walked, and calories burnt, just to mention a few features. My Fitness Pal is a free app for the same purpose, but it is not a gadget.
What are the two SATA-based formats available for a laptop SSD?
Correct answer: 1.8 inch and 2.5 inch
The two SATA formats for SSD drives used in laptops are 1.8 inch and 2.5 inch. There is also a newer non-SATA version that uses the M.2 motherboard connector.
Which display technology produces pictures by passing light via liquid crystals?
Correct answer: LCD
LCDs (liquid crystal displays) generate a picture on the screen by shining a backlight through liquid crystals.