CompTIA 220-1002 Core 2 A+ Take Ten Challenge #4Step 1 of 1010%4-1: The documentation associated with an accounting application states that the user cannot make copies of the application except for backup purposes. Which of these would describe the location of this documentation? EULA NDA DRM PII FOSS 4-2: A system administrator would like to verify the IP address of server www.example.com. Which of the following would provide this information? NSLOOKUP DHCP IPCONFIG NETSTAT NET VIEW 4-3: A security administrator is trying to clean a malware infection, but the malware is moving between systems without any user intervention. Which of these would BEST describe this malware? Ransomware Worm Botnet Virus Rootkit 4-4: When starting Windows, a user receives this message: "One or more services failed to start." Which of the following would be the best way to address this issue? Change the boot drive Reinstall the problematic service Reseat all expansion cards and cable Start in VGA Mode Modify the Windows BCD 4-5: An administrator would like to automate some functions in a user's local browser. Which of these would be the best choice? JavaScript Batch file VBScript Shell script PowerShell 4-6: A system administrator needs to enable Windows application access to a SQL database. Which of the following would be the best choice for this task? Local Security Policy Services ODBC Data Sources Component Services Device Manager 4-7: A system administrator would like to use centralized authentication on the 802.11 network. Which of these technologies would be the best choice for this requirement? AES RADIUS WPS WPA2 CCMP 4-8: Which of the following would be the BEST option before remediating a malware infection? Schedule scans Educate the end user Upgrade the BIOS Run operating system updates Disable System Restore 4-9: A system administrator needs a remote access technology that can provide an encrypted terminal console to servers across many different operating systems. Which of the following would be the BEST choice? AFP SMB RDP SSH Telnet 4-10: A network administrator would like to hide the wireless network name from displaying as an available wireless network. Which of the following would provide this functionality? MAC filtering WPS Firewall SSID suppression WPA2 encryption