CompTIA A+ Core 2 – 25 Random Questions

Posted by:

|

On:

|

Random 25 Questions – Core 2

1 / 25

An employee loses their corporate-owned tablet, which contains confidential company data. To prevent data breach, which of the following actions should be taken immediately?

2 / 25

In a Windows 10 environment, you are tasked with setting up a new user account for an intern. The intern will need access to various network resources but should not have the ability to install software or make system changes. Which type of account should you create?

3 / 25

A team needs elevated privileges to run specific legacy applications without granting full administrative rights. Which account type should you use to balance security and functionality?

4 / 25

For a rapidly growing data set, which backup method minimizes restoration time?

5 / 25

A company’s IT policy requires deploying a filesystem that supports file-level encryption and security permissions to protect sensitive data. Which filesystem meets these requirements?

6 / 25

A company plans to implement a new backup system that provides rapid recovery of recently changed files while minimizing storage space. Which type of backup should be prioritized?

7 / 25

A company allows employees to use their personal smartphones for work-related tasks under a Bring Your Own Device (BYOD) policy. Which of the following policies is essential to secure both the device and the company’s data?

8 / 25

To gain unauthorized access to a company’s premises, an attacker impersonates a courier delivery person, complete with a uniform and fake ID, convincing the front desk personnel to let them enter without proper verification. This scenario exemplifies:

9 / 25

What should be the focus when creating an incident report for a security breach?

10 / 25

A technician has removed malware from a client’s laptop. What is an IMPORTANT post-remediation activity to perform BEFORE considering the removal process complete?

11 / 25

What is a significant advantage of using remote network installation for deploying an operating system in an enterprise environment?

12 / 25

An IT support specialist receives a call from an individual claiming to be from a well-known software vendor. The caller requests remote access to the company’s network to perform a critical update. Which of the following actions should the IT support specialist take to verify the caller’s authenticity?

13 / 25

A social engineer manipulates an employee over the phone to divulge their login credentials by pretending to be a member of the IT department fixing an issue. This tactic is known as:

14 / 25

To copy a file named “original.txt” to a new file called “copy.txt” within the same directory, which command is correct?

15 / 25

What macOS feature securely stores passwords, certificates, and encryption keys, providing users with streamlined access?

16 / 25

After discovering a breach in the company’s network, what should you do immediately after securing the system to prevent further unauthorized access?

17 / 25

A small business uses a grandfather-father-son backup rotation scheme. What is the primary advantage of using this specific rotation scheme?

18 / 25

In a help desk scenario, why is it important for a technician to note progress updates in the ticketing system?

19 / 25

After setting up a new home office, you notice that your wireless signal strength varies significantly throughout the day, impacting video conferencing and file transfers. To ensure optimal performance and reliability of your network, which of the following router settings should you consider adjusting first?

20 / 25

Which macOS feature provides an automated solution for backing up the entire system, including user files, applications, and system files?

21 / 25

A company requires secure remote access for its employees who work from home. They want to ensure that access to the corporate network is secure and that they can manage user credentials centrally. Which system should they implement?

22 / 25

A workstation experiences BSOD errors with a specific error code related to a hardware failure. The workstation was recently upgraded with new hardware. What should be the first step in troubleshooting?

23 / 25

To run a command with superuser privileges without logging in as the superuser, which command should be prefixed to the command needing elevated privileges?

24 / 25

A user reports frequent and unexpected pop-up windows while browsing. What is the most likely cause?

25 / 25

A security analyst notices an unusual pattern of requests to the DNS server from an internal source, attempting to redirect users to malicious websites. This is indicative of which type of attack?

Your score is

Exit