Exam 2: CompTIA A+ Certification Exam: Core 2

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A network administrator wants to plan a major OS upgrade of the router, which acts as a default gateway in an organization. The administrator has documented the purpose of the change, scoped the change, and completed a comprehensive risk analysis. Which of the following is an important part of the change request process for which the administrator still must plan?

Free
(Multiple Choice)
4.7/5
(25)
Correct Answer:
Verified

B

A company needs to destroy several SSDs that contain sensitive information. Which of the following methods is BEST suited for the total destruction of the SSDs?

Free
(Multiple Choice)
4.7/5
(33)
Correct Answer:
Verified

C

A client wants a technician to create a PC naming convention that will make the client's PCs easier to track and identify while in use. Which of the following naming convention formats should the technician follow?

Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
Verified

C

In which of the following file extension types would a user expect to see the command. "net use T:\\server\files"?

(Multiple Choice)
4.9/5
(30)

A user is unable to print to the office's networked laser printer from a Windows desktop. A technician attempts to print a test page, but nothing comes out of the printer. The technician tries to print from a label printer, which is connected via USB, but there is no output from that printer either. Which of the following actions are MOST likely to restore printing functionality to both printers? (Choose two.)

(Multiple Choice)
4.9/5
(41)

Ann, a customer, calls a technician and states that she is very concerned about the privacy of her home computer and the security of her home network while browsing the Internet. Which of the following would the technician MOST likely discuss with Ann to educate her on security concepts addressing her concerns? (Choose two.)

(Multiple Choice)
4.9/5
(35)

A customer has a Linux desktop and is installing a 3TB HDD. The customer wants to use only half of its capacity right now, but would like to be able to increase the size of the partition at a later date. Which of the following filesystem types would the customer's drive require?

(Multiple Choice)
4.8/5
(26)

A user received a call from a bank to confirm a wire transfer; however, the user created no such request. While troubleshooting, a technician discovers there are rules on the user's account that are forwarding the emails to an external email address and deleting the emails from the bank. This is an example of:

(Multiple Choice)
4.8/5
(32)

A Windows user logs on to a network domain computer after recently being switched to a roaming profile. The user reports extremely long startup times. Which of the following should a technician check to address this issue?

(Multiple Choice)
4.8/5
(33)

A user is attempting to create a Windows fileshare on a Windows 10 workstation in a small peer-to-peer environment. The user is logged in with a Microsoft account. Which of the following would be the MOST secure way to allow other users to access the share?

(Multiple Choice)
4.9/5
(42)

Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time because he has already tried everything that has been suggested. Which of the following should the technician do?

(Multiple Choice)
4.9/5
(33)

Which of the following is a community-supported, open-source OS used for both servers and workstations?

(Multiple Choice)
4.9/5
(35)

A technician responds to a call from a user who claims to have a virus on a workstation. The technician observes the following notification from the system tray: There are 1033 infected files on this computer. Click here to disinfect. The link is blocked by the corporate content filter and displays a message stating the site contains known malware. Which of the following should the technician complete to secure the computer with MINIMAL impact to the user?

(Multiple Choice)
4.8/5
(39)

Which of the following wireless security protocols supports the use of a 40-bit encryption key?

(Multiple Choice)
4.8/5
(34)

Which of the following is the MOST secure wireless security protocol?

(Multiple Choice)
4.8/5
(35)

Which of the following file types should be opened when executing a PowerShell script?

(Multiple Choice)
4.8/5
(29)

A customer built a computer with the following specifications: Single hexa-core processor 8GB DDR4 memory 256GB SSD drive Built-in graphics card 32-bit Windows OS Audio editing software The computer seems to be working, but the OS reports only 3.5GB of RAM is available. Which of the following would correct the issue?

(Multiple Choice)
4.9/5
(31)

A user lives in a location that experiences frequent lightning storms. Which of the following would be the LEAST expensive solution to protect the user's computer hardware?

(Multiple Choice)
4.8/5
(42)

A technician is remediating a virus on an infected workstation. All user files are set to system and hidden. Which of the following should a technician perform NEXT to remediate the system?

(Multiple Choice)
4.8/5
(29)

Joe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe states that several symptoms have returned. Which of the following should the technician have covered previously as part of the original repair?

(Multiple Choice)
4.8/5
(45)
Showing 1 - 20 of 409
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)