Search Header Logo

CompTIA A+ (Core 2) Part 1

Authored by Lashawn Moore-Bostic

Computers

Professional Development

30 Questions

Used 21+ times

CompTIA A+ (Core 2) Part 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Ann, a CEO, has purchased a new consumer-class tablet for personal use, but she is unable to connect to the wireless network. Other users have reported that their personal devices are connecting without issues. She has asked you to assist with getting the device online without adjusting her home WiFi configuration. Review the network diagrams and device configurations to determine the cause of the problem and resolve any discovered issues. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Click on 802.11 and Select ac

Click on SSID and select BYOD

Click on Frequency and select 5GHz

At Wireless Security Mode, Click on Security Mode

Select the WPA and the password should be set to TotallySecure!

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A help desk team lead contacts a systems administrator because the technicians are unable to log in to a Linux server that is used to access tools. When the administrator tries to use remote desktop to log in to the server, the administrator sees the GUI is crashing. Which of the following methods can the administrator use to troubleshoot the server effectively?

SFTP

SSH

VNC

MSRA

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company wants to remove information from past users' hard drives in order to reuse the hard drives. Which of the following is the MOST secure method?

Reinstalling Windows

Performing a quick format

Using disk-wiping software

Deleting all files from command-line interface

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user is having phone issues after installing a new application that claims to optimize performance. The user downloaded the application directly from the vendor's website and is now experiencing high network utilization and is receiving repeated security warnings. Which of the following should the technician perform FIRST to mitigate the issue?

Reset the phone to factory settings

Uninstall the fraudulent application

Increase the data plan limits

Disable the mobile hotspot

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process?

End user acceptance

Perform risk analysis

Communicate to stakeholders

Sandbox testing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should a technician do first when encountering malware?

Scan and remove the malware

Schedule automated malware scans

Quarantine the system

Disable System Restore

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best solution to ensure data security on lost or stolen smartphones?

Anti-malware

Remote wipe

Locator applications

Screen lock

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?