CompTIA A+ Core 2 – 25 Random Questions

Posted by:

|

On:

|

Random 25 Questions – Core 2

1 / 25

A large enterprise wants to ensure secure network authentication that minimizes the risk of interception and replay attacks. Which authentication protocol should they implement?

2 / 25

Your company has implemented a new policy requiring that all data stored on external drives must be encrypted. As the IT manager, you decide to use BitLocker To Go for this purpose on Windows 10 devices. What step must you take to implement this policy effectively?

3 / 25

An IT technician is tasked with securely disposing of a number of SSDs from company laptops. Given the unique nature of SSDs compared to HDDs, which method ensures the data is completely unrecoverable while adhering to environmental and data protection standards?

4 / 25

You are installing new workstations in an area prone to power surges. What device should you use to protect the computers from power surges?

5 / 25

Which of the following is a crucial post-malware removal task to ensure future protection against malware?

6 / 25

What new feature in Windows 11 provides different layout options for organizing windows?

7 / 25

An IT administrator needs to select an operating system for corporate desktops that can integrate with an Active Directory domain for centralized management and support enterprise-level security features. Which operating system would be most appropriate?

8 / 25

What application is commonly used to manage devices using Windows Active Directory?

9 / 25

How many different versions of Windows 10 have been made available to date?

10 / 25

You need to monitor and manage multiple client systems remotely. Which type of tool should you use?

11 / 25

Remote employees report that their VPN connections to the office network fail to establish, displaying a security certificate error. What is the most likely cause?

12 / 25

Which command updates the list of available packages and their versions, then installs a new package called “nginx” on Debian-based systems?

13 / 25

An IT specialist is setting up a workstation but finds that the installed antivirus software is unable to update its definitions. What is a COMMON cause of this problem?

14 / 25

What should be the focus when creating an incident report for a security breach?

15 / 25

To gather intelligence before launching a cyber-attack, criminals use social media platforms to collect information about an organization’s employees, key projects, and internal jargon. This preparatory phase is known as:

16 / 25

An organization’s IT security team wants to enhance the security of their network devices, including routers and switches. They require detailed accounting of all commands executed by administrators on these devices. Which protocol should they implement?

17 / 25

A remote worker needs a stable connection to the company’s virtual private network (VPN). Which of the following IP addressing configurations ensures the worker’s home office device maintains a consistent connection?

18 / 25

What technique should be employed to remove malware from a heavily infected system that fails to boot normally?

19 / 25

A company’s security system detects an unauthorized device attempting to connect to the corporate network. The device is isolated and upon further investigation, it is found to be a rogue access point installed by an employee in their office. This scenario demonstrates a failure in what type of security control?

20 / 25

Your company has remote employees who need to securely access the internal network to retrieve confidential files and use internal applications. Which feature of a VPN ensures that data transmitted between the remote employees and the internal network is secure?

21 / 25

A gaming application is being installed on a series of desktops in a gaming café. The application requires a 64-bit OS, at least 8GB of RAM, and a dedicated graphics card with 2GB of VRAM. One of the desktops has a 64-bit OS, 8GB of RAM, but uses integrated graphics with shared memory. What is the best course of action to ensure the application runs optimally on this desktop?

22 / 25

During the deployment of a new database software in a corporate environment, the IT department is required to consider the application’s impact on network resources due to its synchronization features across multiple sites. The application is known to consume significant bandwidth. Which of the following actions should the IT department take to mitigate potential network performance issues?

23 / 25

A technician observes that a system’s homepage is constantly redirected to a “You’ve won a prize!” website, despite resetting the browser settings. Which of the following actions should the technician take FIRST?

24 / 25

During a routine inspection of network traffic, a security analyst discovers irregular DNS lookups that do not align with the organization’s normal operations. This irregular activity is attempting to communicate with known malicious external IPs. This scenario is indicative of:

25 / 25

Which document should an IT administrator consult to understand the process for custom installation of a software package?

Your score is

Exit