CompTIA A+ Core 2 – 25 Random Questions

Posted by:

|

On:

|

Random 25 Questions – Core 2

1 / 25

In a mixed-use environment with both desktop and server applications, an IT manager needs to choose a filesystem that supports snapshots for easy backup and recovery. Which filesystem should be used for the Linux servers?

2 / 25

You need to create a script to remap network drives for multiple users. Which scripting language would be best for this task?

3 / 25

You discover that a company laptop containing sensitive information has been stolen. What is the first step in maintaining the chain of custody for the incident?

4 / 25

A company requires all outbound connections to be logged for audit purposes. Which setting should be enabled in Windows Firewall to accomplish this?

5 / 25

An IT technician notices several employees’ web browsers are redirecting to phishing websites. Which of the following actions should be taken FIRST to resolve this issue?

6 / 25

Kevin’s device started experiencing high data usage and sluggish performance after he downloaded an APK from an untrusted source. What is the MOST effective method to eliminate the malware and secure his device?

7 / 25

You suspect a workstation in the network is infected with malware. What is the NEXT step after verifying the malware symptoms?

8 / 25

A healthcare organization needs to dispose of old servers containing protected health information (PHI). To comply with regulations and ensure data privacy, which of the following steps is crucial when outsourcing the destruction of these servers?

9 / 25

What are the two versions of Windows that you’re expected to know details about for the 220-1102 exam?

10 / 25

You are tasked with setting up workstations in an area with frequent electrical storms. Which device should be used to protect the computers from potential damage?

11 / 25

In a company with high data change rates, which backup frequency strategy is most appropriate?

12 / 25

During asset procurement, why is it important to consider the warranty and licensing agreements?

13 / 25

To improve the security posture of their email system, an organization implements a technique that verifies if an incoming email’s domain matches the IP address it was sent from. This technique helps mitigate which of the following?

14 / 25

A legal firm is installing document management software that requires encryption of documents at rest and in transit. The firm’s current hardware setup includes aging workstations with limited processing power. What is the likely impact of encryption on the firm’s document access and management processes?

15 / 25

After replacing an aging network switch, workstations in one office segment cannot obtain IP addresses via DHCP. Other segments are unaffected. What is the most likely issue?

16 / 25

To map a network drive via the command line, which command would you use?

17 / 25

A small business uses a grandfather-father-son backup rotation scheme. What is the primary advantage of using this specific rotation scheme?

18 / 25

When preparing a flash drive to boot a custom recovery environment, which tool is commonly used to create a bootable USB drive from an ISO image?

19 / 25

A user’s web browser starts with a homepage that the user did not set and cannot change. Which of the following is the MOST likely cause?

20 / 25

After a recent power outage, a user reports that their PC is displaying frequent error messages about corrupted system files when trying to launch applications. Which of the following command-line tools should be used FIRST to repair these files?

21 / 25

Several users complain about slow profile loading times when logging into their workstations, which are part of a domain. The issue began recently, without any significant changes made to the network. What is the likely cause?

22 / 25

A user needs help troubleshooting an issue on their Windows computer. They want to share their screen with you for assistance. Which tool would you use?

23 / 25

Which feature is not supported by Windows 10 Home?

24 / 25

Active Directory supports physical security by:

25 / 25

A cybersecurity team discovered an attack where malicious actors created nearly identical domain names to a popular online shopping site to trick users into entering their credentials. This attack is known as:

Your score is

Exit