CompTIA A+ Core 2 – 25 Random Questions

Posted by:

|

On:

|

Random 25 Questions – Core 2

1 / 25

An office is planning to install a Customer Relationship Management (CRM) software that integrates with their email system. The CRM software requires access to the email server using IMAP on port 143. What should be done to ensure the software functions correctly in a network with strict firewall rules?

2 / 25

After upgrading a computer’s OS, a technician discovers that some hardware is not functioning correctly. What is the most likely cause of this issue?

3 / 25

A company’s IT policy requires deploying a filesystem that supports file-level encryption and security permissions to protect sensitive data. Which filesystem meets these requirements?

4 / 25

Which command displays the current directory that the user is working in?

5 / 25

Which document should an IT administrator consult to understand the process for custom installation of a software package?

6 / 25

When was the initial release of Windows 10?

7 / 25

An administrator needs to map a network drive to a shared folder on a Windows file server for all users in the marketing department. Which command correctly uses the net use command to accomplish this?

8 / 25

An IT technician is tasked with upgrading the storage capacity in a server without causing downtime. Which type of drive should the technician use to ensure the server remains operational during the upgrade?

9 / 25

During the deployment of a new database software in a corporate environment, the IT department is required to consider the application’s impact on network resources due to its synchronization features across multiple sites. The application is known to consume significant bandwidth. Which of the following actions should the IT department take to mitigate potential network performance issues?

10 / 25

A company’s policy requires that all servers on the network have consistent IP addresses for monitoring and firewall configuration purposes. Which of the following IP addressing methods should be used for the servers?

11 / 25

Which of the following is a critical step BEFORE performing malware remediation on a Windows PC?

12 / 25

A technician needs to boot a desktop computer using a USB drive with a Linux distribution for diagnostics. The system does not list the USB drive as a boot option. What should the technician check FIRST in the BIOS settings to solve this problem?

13 / 25

Which dig command syntax is used to query the MX (Mail Exchange) records for the domain example.com?

14 / 25

A system administrator needs to deploy servers that can efficiently handle high-volume, transactional data operations. Which filesystem should they select for the Linux servers to ensure data integrity and improve performance?

15 / 25

The IT department is revising its account management policies to tighten security across the company’s workstations. Which of the following policy changes would most effectively improve workstation security?

16 / 25

During a routine security audit, it was found that attackers had managed to install malware on a networked printer within an organization’s premises to intercept printed documents. This incident underscores the importance of securing which of the following?

17 / 25

A user needs to run diagnostics on a PC that fails to boot into its installed OS. Which boot method should the user employ to start the computer with a minimal OS for troubleshooting?

18 / 25

During an incident response, why is it important to document every action taken?

19 / 25

A data center operates a RAID 5 array for data redundancy and wants to replace a failing drive without interrupting access to data. What feature must the replacement drive support to achieve this?

20 / 25

A Windows 10 user is unable to print documents to a newly installed printer. Which Control Panel utility should the technician use to ensure the printer is set as the default printer?

21 / 25

To prevent unauthorized access, a company policy mandates that all workstations should automatically activate a screen saver lock requiring a password upon resumption. What is the most effective way to implement this policy across all company workstations?

22 / 25

You are installing new workstations in an area prone to power surges. What device should you use to protect the computers from power surges?

23 / 25

A technician needs to deploy a new operating system to multiple computers without existing OSs. Which boot method allows the technician to install the OS without physical media and is most suitable for this scenario?

24 / 25

Which technology is most commonly used to secure entry points to office buildings, requiring employees to authenticate their identity?

25 / 25

A small office wants to automate the process of assigning IP addresses to its devices. Which of the following should a technician configure on the office’s router?

Your score is

Exit