CompTIA A+ Certification Exam: Core 2 試験
Question No : 1
A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring.
Which of the following would BEST accomplish this goal?
Question No : 2
A team needs to deploy a temporary server room at a site to provide support during construction.
Which of the following should they use at this site while setting up the server room?
Question No : 3
A technician is installing the latest OS on a user’s system. The user wants all of the settings and files to remain intact during the installation.
Which of the following upgrade methods should the technician use?
Question No : 4
A security team is auditing a company’s network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information.
Which of the following actions should be taken to close the vulnerability? (Choose two.)
Question No : 5
A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the business’s concerns.
Which of the following configuration settings should the technician change to satisfy the requirements of the business? (Choose two.)
Question No : 6
Which of the following is considered government-regulated data?
Question No : 7
Which of the following features has undergone the most significant changes from Windows 7 to Windows 10 and greatly simplified the operating system installation process?
Question No : 8
A technician is working on a user’s workstation and notices a lot of unknown processes running in the background. The user informs the technician that an application was recently downloaded from the Internet.
Which of the following types of infection does the user MOST likely have?
Question No : 9
A technician is installing Windows 7 64-bit OS on a VM but keeps getting errors.
The specifications for the machine are:
- Two 1GHz CPUs
- 2GB of memory
- 15GB hard drive
- 800 × 600 screen resolution
Which of the following should the technician do to resolve the problem?
Question No : 10
A wireless access point is going to be configured in a small office located in a crowded building.
Which of the following should the installation technician perform to increase the security of the wireless network? (Choose two.)
Question No : 11
A company brings in contractors several times a year to perform inventory, and the contractors use company-supplied laptops. The company’s security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory.
Which of the following BEST enforces this policy?
Question No : 12
A network administrator wants to plan a major OS upgrade of the router, which acts as a default gateway in an organization. The administrator has documented the purpose of the change, scoped the change, and completed a comprehensive risk analysis.
Which of the following is an important part of the change request process for which the administrator still must plan?
Question No : 13
A desktop technician is attempting to upgrade several machines to Windows 10. After realizing there is only one disc for the installation, the technician decides to upgrade over the network.
Which of the following boot methods initiates such an upgrade?
Question No : 14
An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is running slowly, even while not browsing the Internet.
Which of the following actions should the user take?
Question No : 15
A Windows user is attempting to install a local printer and is unsuccessful based on permissions.
Which of the following user types BEST describes this user?