Topic 5: Exam Pool E
Which of the following languages is used for scripting the creation of Active Directory accounts?
A. Bash
B. SQL
C. PHP
D. PowerShell
Explanation: PowerShell is a scripting language that can interact with Active Directory and other Windows components. It has a built-in cmdlet called New-ADUser that can create user accounts in Active Directory. PowerShell can also use the Active Directory module to access other AD-related functions and attributes. Other languages, such as Bash, SQL, and PHP, are not designed for creating Active Directory accounts and would require additional tools or libraries to do so.
A technician successfully removed malicious software from an infected computer after running updates and scheduled scans to mitigate future risks. Which of the following should the technician do next?
A. Educate the end user on best practices for security.
B. Quarantine the host in the antivirus system.
C. Investigate how the system was infected with malware.
D. Create a system restore point.
Explanation: Educating the end user on best practices for security is the next step that the technician should take after successfully removing malicious software from an infected computer. Educating the end user on best practices for security is an important part of preventing future infections and mitigating risks. The technician should explain to the end user how to avoid common sources of malware, such as phishing emails, malicious websites, or removable media. The technician should also advise the end user to use strong passwords, update software regularly, enable antivirus and firewall protection, and backup data frequently. Educating the end user on best practices for security can help the end user become more aware and responsible for their own security and reduce the likelihood of recurrence of malware infections. Quarantining the host in the antivirus system, investigating how the system was infected with malware, and creating a system restore point are not the next steps that the technician should take after successfully removing malicious software from an infected computer. Quarantining the host in the antivirus system is a step that the technician should take before removing malicious software from an infected computer. Quarantining the host in the antivirus system means isolating the infected computer from the network or other devices to prevent the spread of malware. Investigating how the system was infected with malware is a step that the technician should take during or after removing malicious software from an infected computer. Investigating how the system was infected with malware means identifying the source, type, and impact of malware on the system and documenting the findings and actions taken. Creating a system restore point is a step that the technician should take before removing malicious software from an infected computer. Creating a system restore point means saving a snapshot of the system’s configuration and settings at a certain point in time, which can be used to restore the system in case of failure or corruption.
A technician cannot uninstall a system driver because the driver is currently in use. Which of the following tools should the technician use to help uninstall the driver?
A. msinfo32.exe
B. dxdiag.exe
C. msconfig.exe
D. regedit.exe
A large company is changing its password length requirements. The Chief Information Officer is mandating that passwords now be at least 12 characters long, instead of 10. Which of the following should be used to adjust this setting?
A. User accounts
B. Access control lists
C. Authenticator applications
A technician is familiar with most personnel at a customer's location and has clearance to work unsupervised. Which of the following describes how the technician should handle personal communication while on site?
A. Respond to calls and text messages while on site but not when working directly with personnel.
B. Respond to calls and text messages only from family.
C. Respond to calls and text messages only when an emergency situation requires a response.
D. Respond to calls and text messages discreetly while on site.
Explanation: A technician should handle personal communication while on site in a professional and respectful manner. According to the CompTIA A+ Core 2 (220-1102) exam objectives, one of the best practices for communication skills is to “avoid distractions and interruptions” when working with customers1. This means that the technician should not respond to calls and text messages that are not related to the work or the customer, unless there is an emergency situation that requires a response. Responding to personal communication while on site can be seen as rude, unprofessional, and disrespectful to the customer and their time. It can also affect the quality and efficiency of the technician’s work and cause errors or delays. Therefore, the technician should only respond to calls and text messages when an emergency situation requires a response, and inform the customer about the situation and apologize for the interruption. The other options are not appropriate for handling personal communication while on site. Responding to calls and text messages while on site but not when working directly with personnel (A) is still distracting and unprofessional, as it can interfere with the technician’s focus and productivity. Responding to calls and text messages only from family (B) is not a valid criterion, as the technician may receive calls and text messages from other sources that are not related to the work or the customer. Responding to calls and text messages discreetly while on site (D) is not a good practice, as it can still be noticed by the customer or other personnel and create a negative impression.
Page 2 out of 148 Pages |
Previous |