Certmaster Comptia A+ Core 2 Final Assessment Complete
Questions and Correct Detailed Answers (Verified Answers)
· A Windows user is not able to resolve server names on a local network. After
updating the system's hosts file, which command does the user issue?
o ipconfig /renew
o ipconfig /release
o ipconfig /flushdns
o ipconfig /all
Ans: o ipconfig /flushdns
· A user with tech knowledge is browsing the network to identify any available shares
on all servers. While browsing, the user found a share known to contain payroll
information. However, the user is unable to access the information within the share.
Assuming that the user is not authorized to access the payroll information, what is
the most likely reason why the user cannot view the information within the share?
o The permissions are incorrect.
o The user does not have permissions to access the share.
o The share is a hidden share.
o The user is on the wrong server.
pg. 1
, March 25
Ans: o The user does not have permissions to access the share.
· A problematic Windows system with multiple operating systems installed does not
boot properly. A support technician tries to diagnose by outlining the boot process.
The technician determines that the system uses an Extensible Firmware Interface (EFI)
system partition. Which file does the technician inspect for problems related to a
specific operating system boot problem?
o BOOTMGR
o NTOSKRNL
o HAL
o BOOTMGFW
Ans: o BOOTMGFW
· A user builds a new computer for gaming purposes. The ability to upgrade the
performance graphics processing unit (GPU) over time is desired. What GPU type
does the user invest in?
o Integrated graphics
o Video RAM
o Dedicated graphics
o System RAM
pg. 2
, March 25
Ans: o Dedicated graphics
· A user at an organization calls the IT help desk in a panic. The user exclaims that
according to a message on the computer, someone is trying to extort them. What
type of malware does the user experience?
o Rootkit
o Worm
o Ransomware
o Trojan
Ans: o Ransomware
· A recent software installation on a Windows desktop fails. Which internal log file
does a technician review to see what may have gone wrong?
o System
o Application
o Security
o Setup
Ans: o Application
pg. 3
, March 25
· Malware infects a user's computer. A support technician determines that the
malware is executed without requiring any authorization using system privileges.
What type of malware currently infects the system?
o Ransomware
o Keylogger
o Rootkit
o Trojan
Ans: o Rootkit
· What might a security engineer suggest as a solution to deter lunchtime attacks?
o Strong password
o Biometrics
o Permissions
o Policies
Ans: o Policies
· A user contacts an IT helpdesk. The complaint is that the computer is very sluggish.
Support personnel notices high graphics processing unit (GPU) use. What does the
helpdesk determine to be the issue?
o Ransomware
pg. 4