CompTIA A+ Core 2 – 25 Random Questions

Posted by:

|

On:

|

Random 25 Questions – Core 2

1 / 25

Your company processes credit card transactions. What security measure must you implement to protect this regulated data?

2 / 25

An organization’s security policy requires that only a certain web browser is allowed to access the internet for browsing. How should an IT administrator configure the Windows Firewall to comply with this policy?

3 / 25

You want to provide remote desktop support to a user on a Linux machine. Which tool should you use?

4 / 25

Which command is used to search for the string “error” within a file called “log.txt”?

5 / 25

A user reports receiving constant alerts claiming their antivirus software is out of date, but the antivirus application shows it’s updated. What is the most probable explanation?

6 / 25

You are providing IT support to an international team. What is an important consideration for effective communication?

7 / 25

A company requires all outbound connections to be logged for audit purposes. Which setting should be enabled in Windows Firewall to accomplish this?

8 / 25

To improve the security posture of their email system, an organization implements a technique that verifies if an incoming email’s domain matches the IP address it was sent from. This technique helps mitigate which of the following?

9 / 25

Reimaging the system using a pre-existing company image is the most effective way to ensure the ransomware is entirely removed and the laptop is restored to a known, secure state for business use, albeit without the encrypted data.

10 / 25

When updating a network topology diagram, what type of information is most critical to include for compliance with regulatory requirements?

11 / 25

A security analyst is evaluating operating systems for a secure workstation environment that requires high stability, security updates beyond the vendor’s traditional end-of-life (EOL), and the ability to audit the source code. Which operating system should they recommend?

12 / 25

Which Linux command is used to list all files and directories within the current directory?

13 / 25

A company’s IT department is implementing a ticketing system. Which feature should be prioritized to enhance troubleshooting efficiency?

14 / 25

What is the purpose of the shutdown command?

15 / 25

You are assigned to clean a large number of dusty computers in a poorly ventilated area. What personal protective equipment (PPE) should you use?

16 / 25

An IT technician is tasked with securely disposing of a number of SSDs from company laptops. Given the unique nature of SSDs compared to HDDs, which method ensures the data is completely unrecoverable while adhering to environmental and data protection standards?

17 / 25

You are setting up a server room and need to ensure optimal temperature and humidity levels. What is the recommended temperature range for a server room?

18 / 25

What is a major benefit of synthetic backups in a corporate environment?

19 / 25

A financial institution is enhancing its network security measures to protect sensitive customer data. They want to implement an authentication method that requires users to present two or more verification factors to gain access. Which approach should they adopt?

20 / 25

After cleaning a malware infection from a PC, the system unexpectedly shuts down and displays a blue screen of death (BSOD) upon restart. What is the most likely NEXT step?

21 / 25

For finding a file or files and displaying their location, which command is used?

22 / 25

An IT specialist is setting up a workstation but finds that the installed antivirus software is unable to update its definitions. What is a COMMON cause of this problem?

23 / 25

During asset procurement, why is it important to consider the warranty and licensing agreements?

24 / 25

For displaying or modifying environment variables in a command session, which command should be used?

25 / 25

To prevent malware from spreading in a network environment, why is it important to quarantine an infected system BEFORE remediation?

Your score is

Exit