CompTIA A+ Core 2 – 25 Random Questions

Posted by:

|

On:

|

Random 25 Questions – Core 2

1 / 25

An organization uses IoT devices in a public space to monitor environmental conditions. Which of the following measures is most effective in preventing unauthorized physical access and tampering with these devices?

2 / 25

A company’s security system detects an unauthorized device attempting to connect to the corporate network. The device is isolated and upon further investigation, it is found to be a rogue access point installed by an employee in their office. This scenario demonstrates a failure in what type of security control?

3 / 25

You are using compressed air to clean dust out of a computer case. Why is it important to wear safety goggles during this task?

4 / 25

A user reports that their Windows profile fails to load correctly at login, displaying a temporary profile instead. This issue persists even after rebooting several times. Which of the following should be the FIRST step to resolve this issue?

5 / 25

Which command moves or renames “file1.txt” to “newfile.txt”?

6 / 25

When deploying an OS image across multiple desktops in an office, what is a critical step to ensure compatibility with the company’s network?

7 / 25

During a recent security review, it was discovered that an attacker had been able to gather a significant amount of detailed information about the company’s network infrastructure through careful observation of an employee working in a coffee shop. This method is known as:

8 / 25

A Windows 10 user is unable to print documents to a newly installed printer. Which Control Panel utility should the technician use to ensure the printer is set as the default printer?

9 / 25

During an audit, it was discovered that an attacker had successfully changed the website’s DNS records stored on the DNS server, causing the website’s traffic to be redirected to a malicious site. This incident is an example of:

10 / 25

An employee received a text message from what appeared to be their bank, asking them to verify their account details via a link provided in the message. This type of attack is known as:

11 / 25

An employee in a large corporation receives an email from what appears to be the company’s IT department. The email states that the company is updating its security software and requires all employees to log in through a provided link to verify their accounts. What should the employee do first before proceeding with any action requested in the email?

12 / 25

A large enterprise wants to ensure secure network authentication that minimizes the risk of interception and replay attacks. Which authentication protocol should they implement?

13 / 25

You are a desktop support technician. A user reports their system has frozen while working on a critical report. The system is unresponsive to keyboard and mouse inputs. Which of the following should you attempt first to resolve the issue?

14 / 25

While explaining a technical issue to a non-technical client, which approach should you take?

15 / 25

An organization’s senior executive received a personalized email containing a link to what was claimed to be a confidential report but instead led to a credential harvesting site. This is an example of:

16 / 25

A technician is tasked with dividing a network into multiple subnets to optimize performance. The network uses an IP address range of 192.168.0.0/24. Which of the following subnet masks would allow creating at least 4 subnets while maximizing the number of hosts per subnet?

17 / 25

What feature allows macOS users to create and switch between multiple desktops to organize open applications and windows?

18 / 25

To gain unauthorized access to a company’s premises, an attacker impersonates a courier delivery person, complete with a uniform and fake ID, convincing the front desk personnel to let them enter without proper verification. This scenario exemplifies:

19 / 25

An IT manager must document the purpose of a planned change to the company’s network infrastructure. What is the primary benefit of this documentation?

20 / 25

A small company’s network administrator is tasked with enhancing the security of their network, particularly to protect the servers that host sensitive customer data. The company’s network includes a mix of internal workstations, a publicly accessible web server, and a database server that should not be directly accessible from the internet. Which of the following configurations should the administrator implement to best achieve this security goal?

21 / 25

Your IT department needs to deploy software updates and manage configurations for all company laptops remotely. Which feature should you look for in desktop management software to effectively handle this task?

22 / 25

A company has two networks: Network A (192.168.1.0/24) and Network B (192.168.2.0/24). A technician is configuring a computer in Network A that needs access to resources in both networks. What should be set as the computer’s gateway?

23 / 25

Active Directory supports physical security by:

24 / 25

For syncing documents, photos, and device settings across all Apple devices, which feature should be configured on a macOS?

25 / 25

In a corporate environment, which method combines something the user knows with something the user has for authentication purposes?

Your score is

Exit