CompTIA A+ Certification Exam: Core 2 v1.0

Page:    1 / 37   
Exam contains 547 questions

A user's smartphone data usage is well above average. The user suspects an installed application is transmitting data in the background. The user would like to be alerted when an application attempts to communicate with the internet. Which of the following BEST addresses the user's concern?

  • A. Operating system updates
  • B. Remote wipe
  • C. Antivirus
  • D. Firewall


Answer : C

A technician has been tasked with installing a workstation that will be used for point-of-sale transactions. The point-of-sale system will process credit cards and loyalty cards. Which of the following encryption technologies should be used to secure the workstation in case of theft?

  • A. Data-in-transit encryption
  • B. File encryption
  • C. USB drive encryption
  • D. Disk encryption


Answer : D

A user contacted the help desk to report pop-ups on a company workstation, indicating the computer has been infected with 137 viruses and payment is needed to remove them. The user thought the company-provided antivirus software would prevent this issue. The help desk ticket states that the user only receives these messages when first opening the web browser. Which of the following steps would MOST likely resolve the issue? (Choose two.)

  • A. Scan the computer with the company-provided antivirus software.
  • B. Install a new hard drive and clone the user's drive to it.
  • C. Deploy an ad-blocking extension to the browser.
  • D. Uninstall the company-provided antivirus software.
  • E. Click the link in the messages to pay for virus removal.
  • F. Perform a reset on the user's web browser.


Answer : AF

A technician is installing new software on a macOS computer. Which of the following file types will the technician MOST likely use?

  • A. .deb
  • B. .vbs
  • C. .exe
  • D. .app


Answer : D

A technician is investigating an employee's smartphone that has the following symptoms:
✑ The device is hot, even when it is not in use.
✑ Applications crash, especially when others are launched.
✑ Certain applications, such as GPS, are in portrait mode when they should be in landscape mode.
Which of the following can the technician do to MOST likely resolve these issues with minimal impact? (Choose two.)

  • A. Turn on autorotation.
  • B. Activate airplane mode.
  • C. Close unnecessary applications.
  • D. Perform a factory reset.
  • E. Update the device's operating system.
  • F. Reinstall the applications that have crashed.


Answer : DE

A customer reported that a home PC with Windows 10 installed in the default configuration is having issues loading applications after a reboot occurred in the middle of the night. Which of the following is the FIRST step in troubleshooting?

  • A. Install alternate open-source software in place of the applications with issues.
  • B. Run both CPU and memory tests to ensure that all hardware functionality is normal.
  • C. Check for any installed patches and roll them back one at a time until the issue is resolved.
  • D. Reformat the hard drive, and then reinstall the newest Windows 10 release and all applications.


Answer : C

Which of the following could be used to implement secure physical access to a data center?

  • A. Geofence
  • B. Alarm system
  • C. Badge reader
  • D. Motion sensor


Answer : C

The Chief Executive Officer at a bank recently saw a news report about a high-profile cybercrime where a remote-access tool that the bank uses for support was also used in this crime. The report stated that attackers were able to brute force passwords to access systems. Which of the following would BEST limit the bank's risk? (Choose two.)

  • A. Enable multifactor authentication for each support account.
  • B. Limit remote access to destinations inside the corporate network.
  • C. Block all support accounts from logging in from foreign countries.
  • D. Configure a replacement remote-access tool for support cases.
  • E. Purchase a password manager for remote-access tool users.
  • F. Enforce account lockouts after five bad password attempts.


Answer : AF

A user reports a computer is running slow. Which of the following tools will help a technician identify the issue?

  • A. Disk Cleanup
  • B. Group Policy Editor
  • C. Disk Management
  • D. Resource Monitor


Answer : D

Upon downloading a new ISO, an administrator is presented with the following string:
59d15a16ce90c8ee97fa7c211b7673a8
Which of the following BEST describes the purpose of this string?

  • A. XSS verification
  • B. AES-256 verification
  • C. Hash verification
  • D. Digital signature verification


Answer : C

A user's mobile phone has become sluggish. A systems administrator discovered several malicious applications on the device and reset the phone. The administrator installed MDM software. Which of the following should the administrator do to help secure the device against this threat in the future? (Choose two.)

  • A. Prevent a device root.
  • B. Disable biometric authentication.
  • C. Require a PIN on the unlock screen.
  • D. Enable developer mode.
  • E. Block a third-party application installation.
  • F. Prevent GPS spoofing.


Answer : AF

A technician is unable to join a Windows 10 laptop to a domain. Which of the following is the MOST likely reason?

  • A. The domainג€™s processor compatibility is not met.
  • B. The laptop has Windows 10 Home installed.
  • C. The laptop does not have an onboard Ethernet adapter.
  • D. The laptop does not have all current Windows updates installed.


Answer : B

Which of the following OS types provides a lightweight option for workstations that need an easy-to-use, browser-based interface?

  • A. FreeBSD
  • B. Chrome OS
  • C. macOS
  • D. Windows


Answer : B

A user has requested help setting up the fingerprint reader on a Windows 10 laptop. The laptop is equipped with a fingerprint reader and is joined to a domain.
Group Policy enables Windows Hello on all computers in the environment. Which of the following options describes how to set up Windows Hello Fingerprint for the user?

  • A. Navigate to the Control Panel utility, select the Security and Maintenance submenu, select Change Security and Maintenance settings, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete.
  • B. Navigate to the Windows 10 Settings menu, select the Accounts submenu, select Sign-in options, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete.
  • C. Navigate to the Windows 10 Settings menu, select the Update & Security submenu, select Windows Security, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete.
  • D. Navigate to the Control Panel utility, select the Administrative Tools submenu, select the user account in the list, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete.


Answer : B

An architecture firm is considering upgrading its computer-aided design (CAD) software to the newest version that forces storage of backups of all CAD files on the software's cloud server. Which of the following is MOST likely to be of concern to the IT manager?

  • A. All updated software must be tested with all system types and accessories.
  • B. Extra technician hours must be budgeted during installation of updates.
  • C. Network utilization will be significantly increased due to the size of CAD files.
  • D. Large update and installation files will overload the local hard drives.


Answer : C

Page:    1 / 37   
Exam contains 547 questions

Talk to us!


Have any questions or issues ? Please dont hesitate to contact us

Certlibrary.com is owned by MBS Tech Limited: Room 1905 Nam Wo Hong Building, 148 Wing Lok Street, Sheung Wan, Hong Kong. Company registration number: 2310926
Certlibrary doesn't offer Real Microsoft Exam Questions. Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
Terms & Conditions | Privacy Policy