CompTIA A+ Core 2 – 25 Random Questions

Posted by:

|

On:

|

Random 25 Questions – Core 2

1 / 25

During a routine security audit, it was discovered that several workstations still use the default administrator passwords, posing a significant security risk. What action should the IT security team take to address this issue across all company workstations?

2 / 25

How many different versions of Windows 10 have been made available to date?

3 / 25

A department’s IT support wants to automate the process of copying daily reports from users’ computers to a designated network share for backup purposes. Which command-line tool is best suited for scripting this automation?

4 / 25

An organization uses IoT devices in a public space to monitor environmental conditions. Which of the following measures is most effective in preventing unauthorized physical access and tampering with these devices?

5 / 25

When updating a network topology diagram, what type of information is most critical to include for compliance with regulatory requirements?

6 / 25

A software engineering team is deploying a complex development environment that requires specific versions of multiple dependencies, such as libraries and frameworks. The environment also needs to be isolated to prevent conflicts with other projects. What issue might arise if these requirements are not meticulously managed?

7 / 25

During a security audit, an IT specialist discovers that a workstation is allowing all inbound connections regardless of the application. Which of the following should be configured in the Windows Firewall to increase security?

8 / 25

What is the purpose of the shutdown command?

9 / 25

You have just received a shipment of new hard drives for the office. What is the best way to store these components before installation?

10 / 25

A user reports that they cannot send email from their desktop email client. An IT technician suspects the Windows Firewall is blocking the application. Which of the following ports should the technician check and potentially create an outbound rule for, to resolve this issue?

11 / 25

An IT security training session is being conducted to educate employees about password best practices for their workstations. Which of the following guidelines should be emphasized as a best practice?

12 / 25

A technician needs to deploy a new image to multiple computers without existing operating systems. Which boot method should be utilized for a network-based deployment?

13 / 25

For a rapidly growing data set, which backup method minimizes restoration time?

14 / 25

Which command displays the amount of disk space used and available on mounted filesystems, providing information in a human-readable format?

15 / 25

If an application becomes unresponsive on macOS, which option allows users to forcibly close it?

16 / 25

When formatting a drive for a new OS installation, which file system is typically used for a Windows environment?

17 / 25

An IT technician is tasked with securely disposing of a number of SSDs from company laptops. Given the unique nature of SSDs compared to HDDs, which method ensures the data is completely unrecoverable while adhering to environmental and data protection standards?

18 / 25

A technician needs to boot a desktop computer using a USB drive with a Linux distribution for diagnostics. The system does not list the USB drive as a boot option. What should the technician check FIRST in the BIOS settings to solve this problem?

19 / 25

A company has two networks: Network A (192.168.1.0/24) and Network B (192.168.2.0/24). A technician is configuring a computer in Network A that needs access to resources in both networks. What should be set as the computer’s gateway?

20 / 25

You need to create a script to remap network drives for multiple users. Which scripting language would be best for this task?

21 / 25

After replacing an aging network switch, workstations in one office segment cannot obtain IP addresses via DHCP. Other segments are unaffected. What is the most likely issue?

22 / 25

A user reports that their Windows 10 laptop’s Bluetooth is not functioning. Before checking device drivers, which Control Panel utility should a technician use to troubleshoot the hardware?

23 / 25

A household has numerous smart home devices that frequently lose connection and need to be manually reconnected to the network. The homeowner wants to simplify network management and ensure devices maintain a stable connection. What router setting adjustment can facilitate a more stable connection for these devices?

24 / 25

A company’s employees frequently work from public cafés. The IT department wants to implement a policy to protect against evil twin attacks when employees connect to Wi-Fi networks. Which of the following policies would best achieve this?

25 / 25

Users report that mapped drives are not consistently available upon logging into their domain accounts. What should be investigated FIRST to troubleshoot this issue?

Your score is

Exit