Exam 2: CompTIA A+ Certification Exam: Core 2

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is an authentication protocol that can be used for users in the field?

(Multiple Choice)
4.9/5
(32)

A customer purchased a 3TB HDD to use with a Windows 7 PC and wants to have letter "J" assigned only to the drive. Which of the following types of partitioning should be performed to give the customer full use of the 3 TB drive?

(Multiple Choice)
4.9/5
(34)

A customer has a Windows 7 x86 computer with 4GB of RAM and needs to upgrade the RAM to meet the minimum specifications for a new piece of software. Which of the following should a technician recommend to the customer FIRST?

(Multiple Choice)
4.8/5
(37)

After connecting to the corporate VPN, a user's workstation is no longer to browse Internet websites. A technician discovers launching a different web browser on the same computer reaches the websites correctly. Which of the following should the technician do NEXT?

(Multiple Choice)
4.8/5
(33)

A user spills a small amount of toner from a laser printer onto the floor. Which of the following is the safest way to clean up the toner?

(Multiple Choice)
4.8/5
(41)

A customer is shopping for a new tablet. The customer is primarily concerned about transferring applications from the old tablet to the new one. Which of the following specifications is MOST important when selecting a new tablet?

(Multiple Choice)
4.9/5
(29)

While attempting to install a new program, an end user is notified the workstation meets the memory requirements, but it does not meet the requirements for free space. Due to time constraints, the user needs a quick way to install and access the program. Which of the following is the user's BEST option given the situation?

(Multiple Choice)
4.7/5
(32)

After a security audit, a technician is tasked with implementing new measures to help secure company workstations. The new policy states that all workstations must be signed off at night, a password is necessary to boot the computer, and encryption must be enabled. Which of the following features should the technician implement to BEST meet these requirements? (Choose three.)

(Multiple Choice)
4.9/5
(38)

A corporate network was recently infected by a malicious application on a flash drive that downloaded sensitive company files and injected a virus, which spread onto the network. Which of the following best practices could have prevented the attack?

(Multiple Choice)
4.8/5
(34)

A systems administrator has discovered a folder on the server with numerous inappropriate pictures and videos, which is in violation of the company's AUP. Which of the following would be the NEXT appropriate act?

(Multiple Choice)
4.9/5
(32)

A user is attempting to install an application and receives an error stating there is not enough space to install the application. Which of the following did the user overlook?

(Multiple Choice)
4.8/5
(32)

Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the memory, power supply, and monitor are all working. The technician runs internal diagnostics on the PC, but the hard drive is not recognized. Which of the following messages will be displayed?

(Multiple Choice)
4.9/5
(43)

A small office calls a technician to investigate some "invalid certificate" errors from a concerned user. The technician observes that whenever the user attempts to access a secure website from the Windows desktop, this error is encountered. No other users in the office are experiencing this error. Which of the following should the technician do NEXT? (Choose two.)

(Multiple Choice)
5.0/5
(32)

A customer is pressuring a project manager to get things done on time. Which of the following has the project manager failed to do in this case?

(Multiple Choice)
4.8/5
(34)

While preparing a computer that will be issued to a new user, the technician discovers the computer's former user configured a supervisor password in the BIOS. Which of the following can the technician do to allow the password to be removed?

(Multiple Choice)
4.9/5
(37)

A technician repaired a laptop for a customer. The customer then complained the repair took too long and questioned the steps the technician took to fix the problem. Which of the following should the technician do NEXT?

(Multiple Choice)
4.8/5
(35)

Which of the following forms of regulated data is MOST important to consider when browsing e-commerce sites on the Internet?

(Multiple Choice)
4.9/5
(43)

A technician is installing a private PC in a public workspace. Which of the following password practices should the technician implement on the PC to secure network access?

(Multiple Choice)
4.8/5
(37)

A user calls the help desk regarding a new Windows issues that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem. Which of the following would MOST likely fix the issue?

(Multiple Choice)
4.9/5
(42)

A user believes there is a virus on a laptop. The user installs additional real-time protection antivirus software but is now experiencing extremely slow performance on the laptop. Which of the following should a technician do to resolve the issue and avoid recurrence?

(Multiple Choice)
4.8/5
(33)
Showing 41 - 60 of 409
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)