CompTIA A+ Core 2 – 25 Random Questions

Posted by:

|

On:

|

Random 25 Questions – Core 2

1 / 25

Users report intermittent wireless connectivity issues in various parts of the office. The wireless access points (APs) are all the same model and firmware version. What should be checked first?

2 / 25

Which tool should be used to encrypt the entire system drive on a macOS, securing data at rest?

3 / 25

You suspect a workstation in the network is infected with malware. What is the NEXT step after verifying the malware symptoms?

4 / 25

To secure data on external USB drives used by employees for work-related documents, you decide to implement encryption. Which tool should you use for this purpose?

5 / 25

Which Linux command is used to list all files and directories within the current directory?

6 / 25

Following an update, a user finds that their mobile device no longer connects to their Bluetooth headphones. What should be the technician’s first troubleshooting step?

7 / 25

After noticing several employees receiving phishing emails, the IT department sent out a fake phishing email to educate and identify employees who might need additional training. This practice is known as:

8 / 25

A cybersecurity analyst notices an increase in traffic to a specific website frequently visited by the company’s employees. Further investigation reveals that the website has been compromised and is now serving malware, specifically targeting the company’s network. This technique is known as:

9 / 25

An administrator wants to implement an additional layer of security for accessing shared network resources. Which of the following is the MOST effective method?

10 / 25

A user complains that every time they reboot their computer, the desktop icons rearrange and some settings revert to defaults. What is likely happening?

11 / 25

You need to remotely manage a Windows server to perform administrative tasks such as software installation and system updates. Which feature of RDP makes it suitable for this task?

12 / 25

Which physical security measure is most effective for controlling access to a high-security facility?

13 / 25

A network administrator needs to ensure a specific department’s computers always receive the same IP range within the company network. Which of the following DHCP configurations should the administrator use?

14 / 25

Your company uses software that includes DRM. What is the purpose of DRM in this context?

15 / 25

A critical server has been compromised by malware. What is the best practice to ensure data integrity and preservation before beginning the cleanup process?

16 / 25

A user complains that their video editing software becomes exceedingly slow when working with high-definition video files. The system meets the minimum requirements for the software. To improve performance, which of the following should be considered FIRST?

17 / 25

During a routine maintenance check in a server room, you need to replace a faulty RAM module. What should you place on your workbench before starting the replacement?

18 / 25

You are setting up a new user account for a user the IT department, the user needs to be able to download software and make changes on the PC. Which account type should you assign to ensure they have the necessary permissions to manage the system and network settings?

19 / 25

An IT security officer is reviewing the company’s physical security measures to prevent unauthorized access to secure areas. Which of the following would be the most effective measure to mitigate the risk of tailgating?

20 / 25

An IT technician receives reports that several PCs are showing the same “Software not genuine” message after cloning. What should be the technician’s FIRST step?

21 / 25

A company’s employees are experiencing issues with accessing network resources. Which of the following is MOST likely to be causing this problem?

22 / 25

Your team needs to collaborate on a large project that involves sharing and editing multiple documents and files in real-time. Which type of software would be most suitable for this task?

23 / 25

Your team is considering using an open-source software for a new project. What should you verify about the open-source license before proceeding?

24 / 25

In an effort to infiltrate a secure facility, an attacker followed closely behind an authorized employee without being noticed, gaining unauthorized access. This method is called:

25 / 25

What does the sfc /scannow command do?

Your score is

Exit