Join the discussion
Question 1/126
A user reports a workstation has been performing strangely after a suspicious email was opened on it earlier in the week. Which of the following should the technician perform FIRST?
Correct Answer: B
Explanation
https://partners.comptia.org/docs/default-source/resources/comptia-a-220-1102-exam-objectives-(3-0) When a user reports that their workstation is behaving strangely after opening a suspicious email, the first step a technician should take is to run a virus scan on the computer. This is because opening a suspicious email is a common way for viruses and malware to infect a computer. Running a virus scan can help identify and remove any infections that may be causing the computer to behave strangely.
https://partners.comptia.org/docs/default-source/resources/comptia-a-220-1102-exam-objectives-(3-0) When a user reports that their workstation is behaving strangely after opening a suspicious email, the first step a technician should take is to run a virus scan on the computer. This is because opening a suspicious email is a common way for viruses and malware to infect a computer. Running a virus scan can help identify and remove any infections that may be causing the computer to behave strangely.
Add Comments
- Other Question (126q)
- Q1. A user reports a workstation has been performing strangely after a suspicious email was op...
- Q2. A customer calls a service support center and begins yelling at a technician about a featu...
- Q3. A systems administrator notices that a server on the company network has extremely high CP...
- Q4. A department has the following technical requirements for a new application: (Exhibit) The...
- Q5. A user is receiving repeated pop-up advertising messages while browsing the internet. A ma...
- Q6. A user attempts to open some files, but a message appears stating that the files are encry...
- Q7. A user's corporate phone was stolen, and the device contains company trade secrets. Which ...
- Q8. After clicking on a link in an email a Chief Financial Officer (CFO) received the followin...
- Q9. A technician needs to formal a USB drive to transfer 20GB of data from a Linux computer to...
- Q10. A police officer often leaves a workstation for several minutes at a time. Which of the fo...
- Q11. A technician is setting up a new laptop for an employee who travels, Which of the followin...
- Q12. A user calls the help desk to report potential malware on a computer. The anomalous activi...
- Q13. During a recent flight an executive unexpectedly received several dog and cat pictures whi...
- Q14. A technician is selling up a newly built computer. Which of the following is the FASTEST w...
- Q15. A wireless network is set up, but it is experiencing some interference from other nearby S...
- Q16. Which of the following common security vulnerabilities can be mitigated by using input val...
- Q17. A systems administrator is setting up a Windows computer for a new user Corporate policy r...
- Q18. Which of the following is the MOST important environmental concern inside a data center?...
- Q19. A systems administrator is tasked with configuring desktop systems to use a new proxy serv...
- Q20. A customer called the help desk to report that a machine that was recently updated is no l...
- Q21. After clicking on a link in an email a Chief Financial Officer (CFO) received the followin...
- Q22. Every time a user tries to open the organization's proprietary application on an Android t...
- Q23. A user receives a call from someone who claims to be from the user's bank and requests inf...
- Q24. A new spam gateway was recently deployed at a small business However; users still occasion...
- Q25. A small business owner wants to install newly purchased software on all networked PCs. The...
- Q26. Ann, a CEO, has purchased a new consumer-class tablet for personal use, but she is unable ...
- Q27. A new spam gateway was recently deployed at a small business However; users still occasion...
- Q28. A technician needs lo formal a USB drive to transfer 20GB of data from a Linux computer to...
- Q29. A company implemented a BYOD policy and would like to reduce data disclosure caused by mal...
- Q30. An executive has contacted you through the help-desk chat support about an issue with a mo...
- Q31. A user is unable to access files on a work PC after opening a text document. The text docu...
- Q32. Which of the following Wi-Fi protocols is the MOST secure?...
- Q33. A user enabled a mobile device's screen lock function with pattern unlock. The user is con...
- Q34. A technician needs to recommend the best backup method that will mitigate ransomware attac...
- Q35. A technician needs to access a Windows 10 desktop on the network in a SOHO using RDP. Alth...
- Q36. A technician is investigating an employee's smartphone that has the following symptoms * T...
- Q37. Which of the following is the MOST important environmental concern inside a data center?...
- Q38. A technician is attempting to mitigate micro power outages, which occur frequently within ...
- Q39. Which of the following data is MOST likely to be regulated?...
- Q40. A Microsoft Windows PC needs to be set up for a user at a targe corporation. The user will...
- Q41. A user is unable to access a website, which is widely used across the organization, and re...
- Q42. A user calls the help desk to report that none of the files on a PC will open. The user al...
- Q43. A manager called the help desk to ask for assistance with creating a more secure environme...
- Q44. Which of the following operating systems is considered closed source?...
- Q45. Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work the t...
- Q46. Which of the following could be used to implement secure physical access to a data center?...
- Q47. A data center is required to destroy SSDs that contain sensitive information. Which of the...
- Q48. A technician is troubleshooting an issue that requires a user profile to be rebuilt. The t...
- Q49. A customer recently experienced a power outage at a SOHO. The customer does not think the ...
- Q50. A department has the following technical requirements for a new application: (Exhibit) The...
- Q51. A developer is creating a shell script to automate basic tasks in Linux. Which of the foll...
- Q52. A technician is reimaging a desktop PC. The technician connects the PC to the network and ...
- Q53. A user requires local administrative access to a workstation. Which of the following Contr...
- Q54. Which of the following often uses an SMS or third-party application as a secondary method ...
- Q55. A network technician installed a SOHO router for a home office user. The user has read rep...
- Q56. A change advisory board just approved a change request. Which of the following is the MOST...
- Q57. A user reports a computer is running stow. Which of the following tools will help a techni...
- Q58. A Chief Executive Officer has learned that an exploit has been identified on the web serve...
- Q59. A user wants to set up speech recognition on a PC In which of the following Windows Settin...
- Q60. Which of The following refers to the steps to be taken if an Issue occurs during a change ...
- Q61. A police officer often leaves a workstation for several minutes at a time. Which of the fo...
- Q62. A technician installed a known-good, compatible motherboard on a new laptop. However, the ...
- Q63. A company has just refreshed several desktop PCs. The hard drives contain PII. Which of th...
- Q64. A user wants to set up speech recognition on a PC In which of the following Windows Settin...
- Q65. A macOS user needs to create another virtual desktop space. Which of the following applica...
- Q66. A macOS user is installing a new application. Which of the following system directories is...
- Q67. A technician downloaded software from the Internet that required the technician to scroll ...
- Q68. Which of the following must be maintained throughout the forensic evidence life cycle when...
- Q69. A user connected a laptop to a wireless network and was tricked into providing login crede...
- Q70. A customer reported that a home PC with Windows 10 installed in the default configuration ...
- Q71. Which of the following is an example of MFA?
- Q72. Which of the following is MOST likely contained in an EULA?...
- Q73. A desktop engineer is deploying a master image. Which of the following should the desktop ...
- Q74. A user's smartphone data usage is well above average. The user suspects an installed appli...
- Q75. Upon downloading a new ISO, an administrator is presented with the following string: 59d15...
- Q76. A remote user is having issues accessing an online share. Which of the following tools wou...
- Q77. A technician is working to resolve a Wi-Fi network issue at a doctor's office that is loca...
- Q78. An Android user reports that when attempting to open the company's proprietary mobile appl...
- Q79. Which of the following filesystem formats would be the BEST choice to ensure read and writ...
- Q80. Which of the following file extensions are commonly used to install applications on a macO...
- Q81. Which of the following provide the BEST way to secure physical access to a data cento serv...
- Q82. A technician is troubleshooting a mobile device that was dropped. The technician finds tha...
- Q83. A technician needs to document who had possession of evidence at every step of the process...
- Q84. A technician suspects a rootkit has been installed and needs to be removed. Which of the f...
- Q85. A user is unable to log in to the domain with a desktop PC, but a laptop PC is working pro...
- Q86. A user reports a PC is running slowly. The technician suspects high disk I/O. Which of the...
- Q87. A technician is troubleshooting a computer with a suspected short in the power supply. Whi...
- Q88. Each time a user tries to go to the selected web search provider, a different website open...
- Q89. A technician is finalizing a new workstation for a user. The user's PC will be connected t...
- Q90. A customer called the help desk to report that a machine that was recently updated is no l...
- Q91. Which of the following features allows a technician to configure policies in a Windows 10 ...
- Q92. An Android user reports that when attempting to open the company's proprietary mobile appl...
- Q93. A user receives a call from someone who claims to be from the user's bank and requests inf...
- Q94. A user calls the help desk to report potential malware on a computer. The anomalous activi...
- Q95. A systems administrator is experiencing Issues connecting from a laptop to the corporate n...
- Q96. A customer recently experienced a power outage at a SOHO. The customer does not think the ...
- Q97. A desktop support technician is tasked with migrating several PCs from Windows 7 Pro to Wi...
- Q98. A small-office customer needs three PCs to be configured in a network with no server. Whic...
- Q99. A bank would like to enhance building security in order to prevent vehicles from driving i...
- Q100. Which of the following is used to explain issues that may occur during a change implementa...
- Q101. A user notices a small USB drive is attached to the user's computer after a new vendor vis...
- Q102. A user rotates a cell phone horizontally to read emails, but the display remains vertical,...
- Q103. A user added a second monitor and wants to extend the display to it. In which of the follo...
- Q104. A call center handles inquiries into billing issues for multiple medical facilities. A sec...
- Q105. A technician just completed a Windows 10 installation on a PC that has a total of 16GB of ...
- Q106. A user needs assistance changing the desktop wallpaper on a Windows 10 computer. Which of ...
- Q107. A technician downloaded software from the Internet that required the technician to scroll ...
- Q108. A user calls the help desk and reports a workstation is infected with malicious software. ...
- Q109. A help desk technician is troubleshooting a workstation in a SOHO environment that is runn...
- Q110. A user contacted the help desk to report pop-ups on a company workstation indicating the c...
- Q111. A technician is upgrading the backup system for documents at a high-volume law firm. The c...
- Q112. A user is experiencing frequent malware symptoms on a Windows workstation. The user has tr...
- Q113. A technician needs to transfer a large number of files over an unreliable connection. The ...
- Q114. A Windows workstation that was recently updated with approved system patches shut down ins...
- Q115. Which of the following is the STRONGEST wireless configuration?...
- Q116. A technician received a call stating that all files in a user's documents folder appear to...
- Q117. A Chief Executive Officer has learned that an exploit has been identified on the web serve...
- Q118. While staying at a hotel, a user attempts to connect to the hotel Wi-Fi but notices that m...
- Q119. An executive has contacted you through the help-desk chat support about an issue with a mo...
- Q120. A technician installed Windows 10 on a workstation. The workstation only has 3.5GB of usab...
- Q121. A technician needs to provide recommendations about how to upgrade backup solutions for a ...
- Q122. A technician installed a new application on a workstation. For the program to function pro...
- Q123. A change advisory board did not approve a requested change due to the lack of alternative ...
- Q124. A developer receives the following error while trying to install virtualization software o...
- Q125. A technician has been tasked with installing a workstation that will be used tor point-of-...
- Q126. An incident handler needs to preserve evidence for possible litigation. Which of the follo...
