CompTIA A+ Certification Exam: Core 2 v1.0

Page:    1 / 6   
Exam contains 76 questions

A computer technician is implementing a solution to support a new internet browsing policy for a customer's business. The policy prohibits users from accessing unauthorized websites based on categorization. Which of the following should the technician configure on the SOHO router?

  • A. Secure management access
  • B. Group Policy Editor
  • C. Content filtering
  • D. Firewall


Answer : C

Recently, the number of users sharing smartphone passcodes has increased. The management team wants a technician to deploy a more secure screen lock method. Which of the following technologies should the technician use?

  • A. Pattern lock
  • B. Facial recognition
  • C. Device encryption
  • D. Multifactor authentication


Answer : B

An end user's laptop is having network drive connectivity issues in the office. The end user submits a help desk ticket, and a support technician is able to establish a remote connection and fix the issue. The following day, however, the network drive is disconnected again. Which of the following should the technician do next?

  • A. Connect remotely to the user’s computer to see whether the network drive is still connected.
  • B. Send documentation about how to fix the issue in case it reoccurs.
  • C. Escalate the ticket to the next level.
  • D. Keep the ticket open until next day, then close the ticket.


Answer : C

Which of the following provides information to employees, such as permitted activities when using the organization's resources?

  • A. AUP
  • B. MNDA
  • C. DRM
  • D. EULA


Answer : A

A technician needs to install an operating system on a large number of workstations. Which of the following is the fastest method?

  • A. Physical media
  • B. Mountable ISO
  • C. Manual installation
  • D. Image deployment


Answer : D

A user is working from home and is unable to access work files on a company laptop. Which of the following should a technician configure to fix the network access issue?

  • A. Wide-area network
  • B. Wireless network
  • C. Proxy network settings
  • D. Virtual private network


Answer : D

A technician is troubleshooting an issue in which a service runs momentarily and stops at certain points in the process. The technician needs to determine the root cause of this issue. Which of the following tools should the technician use?

  • A. Event Viewer
  • B. Task Manager
  • C. Internet Options
  • D. Process Explorer


Answer : A

Which of the following is an example of an application publisher including undisclosed additional software in an installation package?

  • A. Virus
  • B. Ransomware
  • C. Potentially unwanted program
  • D. Trojan


Answer : C

A technician needs to map a shared drive from a command-line interface. Which of the following commands should the technician use?

  • A. pathping
  • B. nslookup
  • C. net use
  • D. tracert


Answer : C

A help desk team was alerted that a company-owned cell phone has an unrecognized password-cracking application. Which of the following should the help desk team do to prevent further unauthorized installations from occurring?

  • A. Configure Group Policy.
  • B. Implement PAM.
  • C. Install anti-malware software.
  • D. Deploy MDM.


Answer : D

Which of the following is used in addition to a password to implement MFA?

  • A. Sending a code to the user's phone
  • B. Verifying the user's date of birth
  • C. Prompting the user to solve a simple math problem
  • D. Requiring the user to enter a PIN


Answer : A

A technician is preparing to replace the batteries in rack-mounted UPS system. After ensuring the power is turned off and the batteries are fully discharged, the technician needs to remove the battery modules from the bottom of the rack. Which of the following steps should the technician take?

  • A. Ensure the fire suppression system is ready to be activated.
  • B. Use appropriate lifting techniques and guidelines.
  • C. Place the removed batteries in an antistatic bag.
  • D. Wear a face mask to filter out any harmful fumes.


Answer : B

A technician is setting up a surveillance system for a customer. The customer wants access to the system's web interface on the LAN via the system’s IP address. Which of the following should the technician use to prevent external log-in attempts from the internet?

  • A. Port mapping
  • B. Subnetting
  • C. Static IP
  • D. Content filtering


Answer : A

A technician needs to configure laptops so that only administrators can enable virtualization technology if needed. Which of the following should the technician configure?

  • A. BIOS password
  • B. Guest account
  • C. Screen lock
  • D. AutoRun setting


Answer : A

Which of the following file types would a desktop support technician most likely use to automate tasks for a Windows user log-in?

  • A. .bat
  • B. .sh
  • C. .py
  • D. .js


Answer : A

Page:    1 / 6   
Exam contains 76 questions

Talk to us!


Have any questions or issues ? Please dont hesitate to contact us

Certlibrary.com is owned by MBS Tech Limited: Room 1905 Nam Wo Hong Building, 148 Wing Lok Street, Sheung Wan, Hong Kong. Company registration number: 2310926
Certlibrary doesn't offer Real Microsoft Exam Questions. Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
Terms & Conditions | Privacy Policy