Exam 2: CompTIA A+ Certification Exam: Core 2

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An administrator is setting up a Windows terminal server. Which of the following settings should the administrator modify to increase server security? (Select two.)

(Multiple Choice)
4.8/5
(34)

A technician performs a risk assessment and determines a requested change has low risk and low impact. Which of the following best practices should the technician follow to proceed with implementing the change?

(Multiple Choice)
4.8/5
(45)

A technician is investigating the cause of a Windows 7 PC running very slow. While reviewing Task Manager, the technician finds one process is using more than 90% of the CPU. Outbound network traffic on port 25 is very high, while inbound network traffic is low. Which of the following tasks should be done FIRST?

(Multiple Choice)
4.9/5
(38)

An employee reported that a suspicious individual was looking through the recycle bin. Which of the following types of social engineering threats is this?

(Multiple Choice)
4.9/5
(33)

A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources. Which of the following protocols and authentication methods should the technician implement? (Choose two.)

(Multiple Choice)
4.9/5
(36)

A desktop technician is attempting to upgrade several machines to Windows 10. After releasing there is only one disc for the installation, the technician decides to upgrade over the network. Which of the following boot methods initiates such an upgrade?

(Multiple Choice)
4.7/5
(38)

A company is implementing multifactor authentication and requires a solution that utilizes TCP. Which of the following will the company MOST likely select?

(Multiple Choice)
4.8/5
(30)

Which of the following are typically too dangerous to be disassembled by an in-house technician? (Choose two.)

(Multiple Choice)
4.9/5
(36)

Which of the following types of social engineering attacks can be prevented by the destruction of documents with personal or sensitive information?

(Multiple Choice)
4.8/5
(33)

Which of the following features has undergone the most significant changes from Windows 7 to Windows 10 and greatly simplified the operating system installation process?

(Multiple Choice)
4.9/5
(43)

A user's computer was infected with malware, and a technician successfully removed the infection. However, the user reports certain web-based services are still inaccessible. Which of the following should the technician perform FIRST to resolve the issue?

(Multiple Choice)
4.9/5
(39)

Which of the following standards controls the processing of credit cards?

(Multiple Choice)
4.9/5
(31)

Ann, an end user, is utilizing a stylus on her tablet. The recognition point is off when she uses the stylus, but it registers in the correct spot when she uses her finger. Which of the following would be the BEST resolution to Ann's issue?

(Multiple Choice)
5.0/5
(35)

Which of the following Windows versions introduced using applications in the Metro interface?

(Multiple Choice)
4.7/5
(41)

A technician must manually modify the HOSTS system file in order to resolve a website address to a specified local destination. Which of the following utilities should the technician use to BEST accomplish the task?

(Multiple Choice)
4.8/5
(42)

An office building lost power, and the generator started up. Users on several floors have reported their machines will not start, even though the generator is running. A technician works to divert power from other floors until all users are able to work. Which of the following is the BEST solution for the technician to recommend?

(Multiple Choice)
4.8/5
(41)

Which of the following would MOST likely be used in secure client-server communication?

(Multiple Choice)
4.7/5
(37)

Joe, a user, believes his computer is infected with malware. The device is having difficulty accessing some websites, and web services are not responding from any of the web browsers, although Joe can access these services from his smartphone without issue. The computer's malware scanner has the latest definitions installed. Which of the following would BEST explain why the computer is functioning this way?

(Multiple Choice)
4.9/5
(39)

An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is running slowly, even while not browsing the Internet. Which of the following actions should the user take?

(Multiple Choice)
4.8/5
(44)

An employee is unable to view in-office network folders while working at home. Which of the following is the MOST likely cause of the problem?

(Multiple Choice)
4.7/5
(34)
Showing 361 - 380 of 409
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)