CompTIA A+ Core 2 – 25 Random Questions

Posted by:

|

On:

|

Random 25 Questions – Core 2

1 / 25

An organization’s security policy mandates the use of full disk encryption to protect data on employee laptops. Which filesystem should be used on laptops running Windows 10 to meet this requirement?

2 / 25

Your company processes credit card transactions. What security measure must you implement to protect this regulated data?

3 / 25

An organization is retiring its multifunction printers that have been used for printing sensitive documents. These printers have internal storage that may contain residual data. Which disposal method ensures the security of the stored data?

4 / 25

Which macOS application provides a command-line interface for advanced management, troubleshooting, and automation tasks?

5 / 25

To change the permissions of “example.txt” to allow the owner to read, write, and execute, the group to read and execute, and others to only read, which command should be used?

6 / 25

You need to remotely manage a Windows server to perform administrative tasks such as software installation and system updates. Which feature of RDP makes it suitable for this task?

7 / 25

A network administrator needs to ensure that only members of the HR department can access a specific shared folder. What is the BEST way to accomplish this?

8 / 25

A growing company frequently adds and removes devices from its network. The IT department wants to minimize the administrative overhead of maintaining DNS records. Which of the following DNS configurations should be implemented?

9 / 25

A company plans to implement a new backup system that provides rapid recovery of recently changed files while minimizing storage space. Which type of backup should be prioritized?

10 / 25

A network management tool needs to be installed on a server. The tool requires a minimum of 4 CPU cores and 8GB of RAM. The server has an 8-core CPU but only 4GB of RAM. Before proceeding with the installation, what should be done to ensure the tool functions correctly?

11 / 25

An IT support specialist receives a call from an individual claiming to be from a well-known software vendor. The caller requests remote access to the company’s network to perform a critical update. Which of the following actions should the IT support specialist take to verify the caller’s authenticity?

12 / 25

An IT specialist needs to copy all files from a folder named “Source” to another folder named “Backup” on the same drive. Which command-line tool should they use for this operation?

13 / 25

During a routine security audit, it was found that attackers had managed to install malware on a networked printer within an organization’s premises to intercept printed documents. This incident underscores the importance of securing which of the following?

14 / 25

A user installs a new webcam but finds that their external hard drive is no longer recognized. Both devices are connected via USB. Which of the following actions should be taken to resolve this conflict?

15 / 25

A company’s IT department is reviewing their wireless network security policies to ensure they are using the most secure encryption protocol available for their WiFi networks. Which of the following protocols should they prioritize for the highest level of security?

16 / 25

Mobile Device Management (MDM) enhances physical security by:

17 / 25

To prevent unauthorized access, a company policy mandates that all workstations should automatically activate a screen saver lock requiring a password upon resumption. What is the most effective way to implement this policy across all company workstations?

18 / 25

After a printer driver update, a user can no longer print to the network printer. Which of the following troubleshooting steps is MOST appropriate to resolve the printing issue?

19 / 25

A security analyst notices an unusual pattern of requests to the DNS server from an internal source, attempting to redirect users to malicious websites. This is indicative of which type of attack?

20 / 25

A Windows 10 user wants their laptop to automatically enter sleep mode after 10 minutes of inactivity when running on battery power. Which Control Panel utility allows a technician to configure these specific power settings?

21 / 25

During malware remediation, which of the following is the BEST practice for updating anti-malware software?

22 / 25

A security analyst receives an alert from the SIEM system indicating a sudden spike in outbound traffic. Further investigation reveals that sensitive company data is being sent to an external IP address. This scenario is indicative of:

23 / 25

A security analyst recommends configuring all corporate mobile devices to automatically download and install operating system updates. Which of the following is the most compelling reason for this recommendation?

24 / 25

A technician has removed malware from a client’s laptop. What is an IMPORTANT post-remediation activity to perform BEFORE considering the removal process complete?

25 / 25

You need to provide secure remote access to your company’s internal network for remote workers. Which tool would you use?

Your score is

Exit