CompTIA A+ Core 2
Jack has asked you for a recommendation on which word processing software they should install. There are four different software packages they are considering, and each uses a different licensing type. Jack states he wants to get a copy of Microsoft Word so their son can create reports for school. Which of the following would MOST likely be the best option for them? A. Personal B. Business C. Enterprise D. Open-source
A A Personal license is an option for private individuals who purchase a license with their own funds and solely for their own use. Personal licenses are not to be purchased, refunded, or in any way financed by companies.
You are working on a Windows 10 workstation that is operating much too slowly. Which TWO of the following commands should you use to speed up the system? A. chkdsk B. diskpart C. ipconfig D. dism E. dir F. format
A,D The Deployment Image Servicing and Management (DISM) is a command-line tool used to mount and service Windows images before deployment. The dism command with the /RestoreHealth option can run a scan to identify and repair any image or virtual hard drive corruption. If you have a physical hard drive operating slowly, then the chkdsk command could be used instead.
Your company is concerned about the possibility of power fluctuations that may occur and cause a small dip in the input power to their server room for an extended period of time. What condition is this known as? A. Power Surge B. Brownouts C. Blackouts D. Power spikes
B A brownout is an intentional or unintentional drop in voltage in an electrical power supply system. Intentional brownouts are used for load reduction in an emergency. The reduction lasts for minutes or hours, as opposed to short-term voltage sag (or dip).
Which of the following types of attacks involves changing the system's MAC address before it connects to a wireless network? A. Zombie B. Spoofing C. Botnet D. DDoS
B Spoofing is an attack where the attacker disguises their identity. Examples of spoofing include changing their MAC address (MAC spoofing), their IP address (IP spoofing), or their email address (most commonly used during a phishing campaign)
Your company has just installed a new proxy server and has asked you to configure all of the Windows workstations to use it. Which of the following Internet Options tabs in the Windows Control Panel should you configure? A. General B. Connections C. Content D. Privacy
B The Connections tab in the Internet Options is used to set up the dial-up and VPN settings and the LAN settings. Under the LAN settings, you can configure the proxy server settings for the system.
Which of the following open-source remote access tools allows users to connect to their desktop remotely, see what is on their screen, and control it with their mouse and keyboard? A. Telnet B. VNC C. SSH D. RDP
B VNC (virtual network computing) is a remote access tool and protocol. It is used for screen sharing on Linux and macOS. RDP is not open-source. SSH and telnet are text-based remote access tools.
Dion Training is worried about the security of the data on their corporate smartphones if lost or stolen. The Chief Security Officer has instructed that the devices be configured so that unauthorized users cannot access the data. Which TWO of the following settings would provide the BEST security and protection for the coporate smartphones' data? A. Require Complex passwords B. Configure that ability to perform a remote wipe. C. Enable device lockouts after 3 failed attempts. D. Enable full device encryption. E. Disable the installation of application from untrusted sources.
B,D The BEST protections for the data would involve enabling full disk encryption and configuring the ability to perform a remote wipe. Even if the device is lost or stolen, its data would be unreadable if it was using full disk encryption. Additionally, by configuring the ability to wipe the device's storage remotely, the data would be erased before a thief can access it.
Due to a global pandemic, your company decides to implement a telework policy for its employees. Unfortunately, the company doesn't have enough time to issue laptops and smartphones to each employee. The Chief Information Officer (CIO) has decided to allow employees to use their own laptops and smartphones when conducting their work from home. Which of the following policies and technology should be implemented to provide security guidance to employees on the use of these devices? (Select TWO) A. EULA B. BYOD C. COPE D. MDM E. DRM F. ACL
B,D The Bring Your Own Device (BYOD) policy is a security framework used to facilitate the use of personally-owned devices to access corporate networks and data. Mobile Device Management (MDM) is a class of management software designed to apply security policies to the use of mobile devices in the enterprise. Since the employees will be using their own laptops and smartphones, the company will need a good BYOD policy to provide security guidance. The company may also implement and install MDM across the employee's devices to better secure the BYOD devices if they give the company permission.
Which of the following commands is used on a Linux system to delete all the files and directories in a Linux system's filesystem? A. rm *.* B. rm -fr*.* C. rm -rf / D. rm /
C The "rm -rf /" is the most dangerous commands to issue in Linux. The rm -rf command is one of the fastest ways to delete a folder and its contents. But a little typo or ignorance may result in unrecoverable system damage. The -r option means that the command will recursively delete the folder and its subfolders. The -f option means that even read-only files will be removed without asking the user. The use of / indicates that the remove command should begin at the root directory (/) and recursively force all files and folders to be deleted under the root. This would delete everything on the system. The *.* would only begin deleting from the current working directory and then delete all files and folders further down the directory structure, not the entire file system.
An employee's inbox is now filled with unwanted emails after their email password had been compromised last week. You helped them reset their password and regain access to their account. Many of the emails are coming from different email addresses ending in spamyou.com. Which of the following actions should you take to help reduce the amount of spam this and other users in your organization are receiving? A. Establish a whitelist of trusted senders. B. Mark each email as span or junk. C. Create a domain-based email filter. D. Click the unsubscribe button of each email.
C Email filtering is any technique used to prevent a user from being overwhelmed with spam or junk email. By creating a domain-based email filter, all emails from the spamyou.com domain could be blocked and prevented from being delivered to the user. Spam can be blocked from reaching an organization using a mail gateway to filter messages. At the user level, the software can redirect spam to a junk folder or similar. Anti-spam filtering needs to balance blocking illegitimate traffic with permitting legitimate messages. Anti-spam techniques can also use lists of known spam servers by establishing a blacklist. If a whitelist is used, only a small number of senders could send emails to the user.
Which of the following MacOS features allows the user to search all of the hard drives, network shares, and files for a keyword or phrase? A. Finder B. Dock C. Spotlight D. Gesture
C Spotlight Search can be used to find almost anything on macOS. To start a new search, click the magnifying glass in the menu bar or press Command+Space to bring up the search box. You can change the document types that are searched in Preferences. If you wish to exclude locations from Spotlight search specifically, click the Privacy button to add a folder or drive to the excluded results.
Which file system type is used to mount remote storage devices on a Linux system? A. NTFS B. exFAT C. NFS D. APFS
C The Network File System (NFS) is used to mount remote storage devices into the local file system on a Linux system. It allows you to mount your local file systems over a network and remote hosts to interact with them while mounted locally on the same system.
What type of structure is "IF THEN ELSE" in scripting? A. Constant B. Loop C. Variable D. Branch
D A branch is used to control the flow within a computer program or script, usually based on some logic condition. Often, these are implemented with IF THEN ELSE statements.
