CompTIA A+ Core 2 Question I-32

A technician is installing a webcam in a nursery for a user to monitor their baby. The user wants to ensure that the webcam is not broadcasting externally. Which of the following would the technician implement on the SOHO router to prevent the broadcast?

A. Enable MAC filtering
B. Enable static IPs
C. Block the outbound port
D. Change the default SSID

CompTIA A+ Core 2 Question I-30

A user, Jane, reports that she suspects her workstation has malware. Peter, the technician, confirms malware exists and starts the process of removing the malware. Which of the following is the FIRST step he should take in removing the malware?

A. Disable antivirus
B. Disable system restore
C. Enable hard drive encryption
D. Format the hard drive

CompTIA A+ Core 2 Question I-28

Peter, a user, is experiencing some operating system errors that are disrupting his ability to boot the workstation. Which of the following would allow him to keep his data, but possibly resolve operating system errors?

A. Clean installation
B. Repair installation
C. Image deployment
D. Quick formatting

Correct Answer: B

CompTIA A+ Core 2 Question I-27

A company has decided that all remote users need to use two-factor authentication to increase security. Several remote users have reported losing the RSA token and have replaced it several times. Which of the following is the solution for these users?

A. Use biometrics instead of the RSA token.
B. Remove the RSA token requirement for any user that has lost an RSA token.
C. Give the users with lost RSA tokens RFID badges instead.
D. Attach the RSA token to the lid of the laptop.

Correct Answer: A

CompTIA A+ Core 2 Question I-25

A user states that every print job submitted to a local printer prints out random characters. Which of the following steps would MOST likely resolve the problem?

A. Reboot the computer and reset the printer
B. Clear the NVRAM on the printer
C. Reload the printer drivers
D. Replace the printer cable

Correct Answer: C

CompTIA A+ Core 2 Question I-24

The folder “Documents” is shared. The user can create and delete documents when on the local PC, but can only read documents when accessing them remotely. Which of the following should be adjusted?

A. Read Only Attribute
B. Share Permissions
C. Firewall Settings
D. NTFS Permissions