CompTIA A+ Core 2 Practice Exam
Questions and Answers 100% Pass
A technician is working on a Windows 10 PC that is running slowly. Which of the following
commands should the technician use to correct this issue? (Choose two.)
A. dir
B. chkdsk
C. dism
D. ipconfig
E. format
F. diskpart - Answer✔B. chkdsk
C. dism
An administrator is setting up a Windows terminal server. Which of the following settings
should the administrator modify to increase server security? (Choose two.)
A. Change the default access port
B. Enforce password complexity
C. Put the terminal server into the router's DMZ
D. Disable logon time restrictions
E. Block all unused ports on the LAN smart switch
1
, ©JASONMcCONNELL 2025 ALL RIGHTS RESERVED
F. Use the local client certificate for server authentication - Answer✔C. Put the terminal server
into the router's DMZ
E. Block all unused ports on the LAN smart switch
A company has hired a new IT firm to manage its network switches and routers. The firm is
geographically separated from the company and will need to able to securely access the
devices. Which of the following will provide the ability to access these devices?
A. Telnet
B. SSH
C. RDP
D. VNC - Answer✔B. SSH
A small office's wireless network was compromised recently by an attacker who brute forced a
PIN to gain access. The attacker then modified the DNS settings on the router and spread
malware to the entire network. Which of the following configurations MOST likely allowed the
attack place? (Choose two.)
A. Guest network
B. TKIP
C. Default login
D. Outdated firmware
E. WPS
F. WEP - Answer✔C. Default login
F. WEP
A client wants a technician to create a PC naming convention that will make the client's PCs
easier to track and identify while in use. Which of the following naming convention formats
should the technician follow?
2
, ©JASONMcCONNELL 2025 ALL RIGHTS RESERVED
A. Domain name, location, IP address
B. Domain name, location, asset ID
C. Asset ID, MAC address
D. Location, RFID - Answer✔C. Asset ID, MAC address
Which of the following threats uses personalized information in an attempt at obtaining
information?
A. Whaling
B. Impersonation
C. Spoofing
D. Spear phishing - Answer✔D. Spear phishing
A technician receives an invalid certificate error when visiting a website with port 443 enabled.
Other computers on the same LAN do not exhibit this symptom. Which of the following needs
to be adjusted on the workstation to fix the issue?
A. Date and time
B. UEFI boot mode
C. Logon times
D. User access control - Answer✔A. Date and time
Which of the following is the amount of memory a user is limited to with a 32-bit version of
Windows?
A. 2GB
B. 4GB
C. 8GB
D. 16GB - Answer✔B. 4GB
3
, ©JASONMcCONNELL 2025 ALL RIGHTS RESERVED
A department in an organization set up a proxy server to manage its Internet stage. A
technician is configuring the Windows workstations to use the new proxy server. Which of the
following Control Panel utilities should the technician use to configure the setting?
A. Internet Options - Advanced
B. Internet Options - Connections
C. Internet Options - Security
D. Internet Options - Content
E. Internet Options - Privacy - Answer✔B. Internet Options - Connections
A technician is working at a help desk firm and receives a call from a user who has experienced
repeated BSODs. The technician is scheduled to take a break just after the call comes in. Which
of the following is the BEST choice for the technician to make?
A. Politely ask the user to call back
B. Ask another technician to take the call
C. Troubleshoot the issue for the user
D. Input the issue as a ticket and escalate to Tier 2
E. Put the user on hold and troubleshoot after the scheduled break - Answer✔B. Ask another
technician to take the call
A user's phone contains customer's PII. The user cannot have the phone automatically wiped
because the data is very valuable. Which of the following is the BEST method of securing the
phone?
A. Fingerprint lock
B. Passcode lock
C. Swipe lock
4