CompTIA A+ Core 2 – 25 Random Questions

Posted by:

|

On:

|

Random 25 Questions – Core 2

1 / 25

A technician has removed malware from a client’s laptop. What is an IMPORTANT post-remediation activity to perform BEFORE considering the removal process complete?

2 / 25

Your company plans to implement a smart office system integrating various Internet of Things (IoT) devices. Which of the following is the most critical security measure to protect against potential IoT device vulnerabilities?

3 / 25

A security analyst notices an unusual pattern of requests to the DNS server from an internal source, attempting to redirect users to malicious websites. This is indicative of which type of attack?

4 / 25

For displaying or modifying environment variables in a command session, which command should be used?

5 / 25

A small business uses a grandfather-father-son backup rotation scheme. What is the primary advantage of using this specific rotation scheme?

6 / 25

When was the initial release of Windows 10?

7 / 25

Which feature allows system administrators to manage every device connected to the network using a single console?

8 / 25

You notice an electrical fire starting in your office. What is the first action you should take?

9 / 25

An IT specialist is configuring a web browser to ensure secure connections for online transactions. Which setting should be prioritized?

10 / 25

You are frustrated with a difficult customer. What should you do?

11 / 25

After setting up a new home office, you notice that your wireless signal strength varies significantly throughout the day, impacting video conferencing and file transfers. To ensure optimal performance and reliability of your network, which of the following router settings should you consider adjusting first?

12 / 25

Which command is used to display the full TCP/IP configuration for all adapters?

13 / 25

After a recent policy update on the corporate firewall, remote employees are unable to connect to the company’s network via Remote Desktop Services. What should be checked first to resolve this issue?

14 / 25

What should be the FINAL step after completing the malware removal process on a client’s workstation?

15 / 25

During a routine upgrade, an IT technician discovers several SSDs that are no longer functional and cannot be wiped using software tools. The organization must dispose of these SSDs securely to ensure that no data recovery is possible. What is the most appropriate method of disposal?

16 / 25

In which scenario is a repair installation of the operating system most appropriate?

17 / 25

Which version of Windows 10 is suitable for large enterprises and offers AppLocker, branch cache, and granular user interface control?

18 / 25

After discovering a breach in the company’s network, what should you do immediately after securing the system to prevent further unauthorized access?

19 / 25

A small business’s network was recently compromised by malware that was introduced through an email attachment opened by one of the employees. What is the MOST effective preventive action to avoid similar incidents in the future?

20 / 25

A small company’s network administrator is tasked with enhancing the security of their network, particularly to protect the servers that host sensitive customer data. The company’s network includes a mix of internal workstations, a publicly accessible web server, and a database server that should not be directly accessible from the internet. Which of the following configurations should the administrator implement to best achieve this security goal?

21 / 25

A system administrator is unable to update the operating system on several machines, receiving a “Failed to Download Updates” error. What is the MOST likely cause of this issue?

22 / 25

Which command displays the current directory that the user is working in?

23 / 25

A critical server has been compromised by malware. What is the best practice to ensure data integrity and preservation before beginning the cleanup process?

24 / 25

A technician is configuring a client’s computer to join a corporate domain. The client’s computer needs to resolve local network resources without fully qualified domain names (FQDNs). Which of the following should the technician configure?

25 / 25

An IT specialist is preparing to perform a clean installation of an operating system on a server that lacks an optical drive. They plan to use a USB flash drive for the installation. Which type of file must be present on the USB flash drive to initiate the operating system installation?

Your score is

Exit