Download PASSEMALL Prep app now
Scan QR code or get instant email to install app
Question:
By deleting or merely renaming files, certain varieties of viruses may make them disappear.
Comments
Your email address will not be published. Required fields are marked *
Comment *
Name*
Email*
URL
Save my name, email, and website in this browser for the next time I comment.
Which of the following can aid in the prevention of phishing attacks?
a spam filter
This is known as ____. It occurs when a user believes they are downloading a reputable antivirus application, but the antivirus application turns out to be malware.
rogue antivirus
Which is your suggestion in the case that a client calls and wants to be able to view, search, or even edit the system registry file?
regedit
Which application could the technician use to view the logs if a technician would like to view the logs stored on an Android smartphone?
Logcat
What should the user try first if a user is having a problem pairing Bluetooth headphones with his mobile device?
Ensure that Bluetooth is turned “on” on the device.
Where can the user go to act that a user is having issues with a frozen program and would like to kill the task?
Task Manager
What is the next step for the user if he is experiencing inaccurate touch response problems with the touch screen on their mobile phone, the problem persists after performing a hard reset of the device?
Replace the digitizer.
What may be the cause of a user receiving a notification stating "Limited Connectivity" when connecting to a new wireless network?
The computer did not receive an IP address from the DHCP server after connecting to the network.
What suggestions can you make to help speed up his hard drive when they complain that the disk drive appears to be running extremely slowly and it is beginning to affect the system speed. He checked and the hard drive is less than half full?
Defragment of the hard drive.
What is the first step you should perform according to the best practices for malware removal?
identify and research malware symptoms
What utility would allow users to view logs if a user calls and wants to view all logs currently on his Windows system?
Event Viewer
What should the technician do next if a technician has identified that there is malware on the computer after researching symptoms that appeared on a user’s computer?
Quarantine the infected system.
You've just successfully eliminated all infections from a computer system. The seventh and last step in CompTIA A+'s "Best Practice for Removing Malware" is ____, according to CompTIA A+ guidelines.
Educate the end user.
What could be done to potentially solve this issue that a user’s computer is taking a very long time to startup?
Disable unnecessary programs from startup.
Comments