A technician needs to document who had possession of evidence at every step of the process. Which of the following does this process describe?
Correct Answer:
C
The process of documenting who had possession of evidence at every step of the process is called chain of custody
An Android user contacts the help desk because a company smartphone failed to complete a tethered OS update A technician determines there are no error messages on the device Which of the following should the technician do NEXT?
Correct Answer:
C
Since there are no error messages on the device, the technician should check if the battery is sufficiently charged1
If the battery is low, the device may not have enough power to complete the update2
In this scenario, the technician has already determined that there are no error messages on the device. The next best step would be to check if the battery is sufficiently charged. If the battery is low, it could be preventing the device from completing the update process.
Verifying that third-party applications are disabled, determining if the device has adequate storage available, and confirming a strong internet connection are all important steps in troubleshooting issues with mobile devices. However, since the problem in this scenario is related to a failed OS update, it is important to first
check the battery level before proceeding with further troubleshooting steps.
A technician suspects a rootkit has been installed and needs to be removed. Which of the following would BEST resolve the issue?
Correct Answer:
C
If a rootkit has caused a deep infection, then the only way to remove the rootkit is to reinstall the operating system. This is because rootkits are designed to be difficult to detect and remove, and they can hide in the operating system’s kernel, making it difficult to remove them without reinstalling the operating system
https://www.minitool.com/backup-tips/how-to-get-rid-of-rootkit-windows-10.html
An administrator has submitted a change request for an upcoming server deployment. Which of the following must be completed before the change can be approved?
Correct Answer:
A
A risk analysis must be completed before a change request for an upcoming server deployment can be approved 1
Risk analysis is an important step in the change management process because it helps identify and mitigate potential risks before changes are implemented. Once the risks have been analyzed and the appropriate measures have been taken to minimize them, the change can be approved and implemented.
Which of the following file extensions are commonly used to install applications on a macOS machine? (Select THREE).
Correct Answer:
BDG
https://support.microsoft.com/en-us/windows/common-file-name-extensions-in-windows-da4a4430-8e76-89c5
.pkg and .dmg are files used to distribute and install applications on macOS. .pkg files are installer packages that may contain multiple files and executable code, while .dmg files are disk images that can contain a single bundled application or multiple applications. .app files are typically the main executable files for macOS applications. The other options listed are file extensions for applications or installers on other platforms (such as .deb for Debian-based Linux systems, .msi for Windows, and .apk for Android). This information is covered in the Comptia A+ Core2 documents/guide under the Mac OS section.