CompTIA A+ Core 2 – 25 Random Questions

Posted by:

|

On:

|

Random 25 Questions – Core 2

1 / 25

A user needs an operating system that can provide a consistent experience across desktop and mobile devices, including smartphones and tablets. Which operating system ecosystem would best meet this requirement?

2 / 25

Your organization is updating its IT assets and needs to dispose of several defective hard drives that cannot be wiped due to malfunction. Which of the following methods is MOST secure and appropriate for disposing of these drives?

3 / 25

An IT specialist is setting up a workstation but finds that the installed antivirus software is unable to update its definitions. What is a COMMON cause of this problem?

4 / 25

A financial institution is outsourcing the disposal of backup tapes that contain sensitive customer information. What is the most important factor to ensure compliance with financial data protection regulations?

5 / 25

A company is adding IoT devices to their network. These devices only need to communicate with a central server within the same network. Which of the following IP addressing schemes would be MOST efficient?

6 / 25

In a company with multiple subnets, a technician is configuring a workstation that needs to communicate with devices on its local subnet as well as devices on other subnets. Which of the following should be configured as the workstation’s gateway?

7 / 25

The IT department is revising its account management policies to tighten security across the company’s workstations. Which of the following policy changes would most effectively improve workstation security?

8 / 25

A department’s IT support wants to automate the process of copying daily reports from users’ computers to a designated network share for backup purposes. Which command-line tool is best suited for scripting this automation?

9 / 25

What does the sfc /scannow command do?

10 / 25

You are tasked with setting up workstations in an area with frequent electrical storms. Which device should be used to protect the computers from potential damage?

11 / 25

To improve internet browsing speed, a network administrator decides to configure the DNS settings strategically. Which of the following configurations will MOST likely increase DNS resolution speed?

12 / 25

You are configuring a new home router to enhance the security of your home network. Which of the following actions is most critical to perform first?

13 / 25

To secure data on external USB drives used by employees for work-related documents, you decide to implement encryption. Which tool should you use for this purpose?

14 / 25

An employee uses a shared computer to conduct sensitive research. Which browser feature should be used to ensure that browsing history and data do not remain on the computer?

15 / 25

A user needs help troubleshooting an issue on their Windows computer. They want to share their screen with you for assistance. Which tool would you use?

16 / 25

An avid gamer is experiencing issues with joining online multiplayer games on their console, which is connected to the home network. They suspect that the router’s settings might be preventing seamless connectivity. Which router setting should be adjusted to improve the game console’s online connectivity?

17 / 25

A small company’s network administrator is tasked with enhancing the security of their network, particularly to protect the servers that host sensitive customer data. The company’s network includes a mix of internal workstations, a publicly accessible web server, and a database server that should not be directly accessible from the internet. Which of the following configurations should the administrator implement to best achieve this security goal?

18 / 25

After a power outage, a server fails to start several critical services automatically, even though they are set to do so. Manual start attempts are successful. What should be the first step in troubleshooting this issue?

19 / 25

With a mix of remote and in-office work, a company wants to optimize DNS resolution for both environments. Which configuration ensures efficient DNS resolution?

20 / 25

A security analyst recommends configuring all corporate mobile devices to automatically download and install operating system updates. Which of the following is the most compelling reason for this recommendation?

21 / 25

A technician needs to upgrade multiple workstations from Windows 10 to Windows 11 within a corporate environment. The workstations have critical business applications installed. What type of installation should the technician use to ensure all data and applications remain intact after the upgrade?

22 / 25

Which of the following is considered a best practice for securing shared resources on a network?

23 / 25

To enhance security awareness, a company creates a fake phishing website mimicking the login page of the company’s employee portal. Employees are directed to the site via an internal training module to see if they enter their credentials. This method is known as:

24 / 25

A Windows 10 PC needs to be configured to conserve as much power as possible when not in use. Which Control Panel utility allows a technician to configure the computer to enter hibernate mode after 30 minutes of inactivity?

25 / 25

A customer is frustrated because their computer is not working as expected. How should you respond?

Your score is

Exit