CompTIA A+ Core 2 Question B-23

A technician is tasked with enabling TLS version 1.0, 1.1, and 1.2 on a client Internet Explorer browser. Which of the following Internet Options Tabs should the technician look to enable the aforementioned TLS settings?

A. Advanced
B. Security
C. Privacy
D. Connections

Correct Answer: A

CompTIA A+ Core 2 Question B-22

A company that manages its own cloud, while utilizing a third-party vendor to help manage storage, is implementing which of the following infrastructure types?

A. Hybrid
B. Community
C. Private
D. Public

Correct Answer: A

CompTIA A+ Core 2 Question B-21

Which of the following commands are used from a Linux command line interface to elevate a user’s access level to administrative privilege? (Select TWO).

A. chmod
B. passwd
C. sudo
D. su
E. runas
F. pwd

Correct Answer: CD

CompTIA A+ Core 2 Question B-20

A technician receives a call regarding a PC’s slow performance. The client states that most applications are slow to respond; boot up and shutdown take much longer than they used to. Hard drive diagnostics pass, but there are error messages in the event viewer stating that the file system is corrupt. Which of the following should the technician do NEXT?

A. Reload the OS using FAT32 instead of NTFS.
B. Change the disk from basic to dynamic.
C. Run chkdsk with the /r switch and reboot the PC.
D. Open the defrag utility and run a drive analysis.

Correct Answer: C

CompTIA A+ Core 2 Question B-18

A networked PC has started to display adware pop-ups when the user opens the browser. Which of the following best practices should the technician employ FIRST when responding to the problem?

A. Disable System Restore
B. Schedule scans and run updates in safe mode
C. Quarantine the system
D. Create a System Restore point

Correct Answer: C

CompTIA A+ Core 2 Question B-17

A user, Jane, has reported that she lost a laptop. The laptop had sensitive corporate information on it that has been published on the Internet. Which of the following is the FIRST step in implementing a best practice security policy?

A. Require biometric identification to log into the laptop.
B. Require multifactor authentication to log into laptop.
C. Require laptop hard drives to be encrypted.
D. Require users to change their password at frequent intervals.
E. Require users to have strong passwords.

Correct Answer: C

CompTIA A+ Core 2 Question B-16

An end user calls the company’s IT service desk to report an inability to open encrypted emails on a mobile device. Which of the following BEST represents a possible cause?

A. A valid certificate suitable for S/MIME is not installed.
B. Emails received by the user lack suitable digital signatures.
C. SSL/TLS certificates stored on the device are expired.
D. The sender did not have the addressee’s public certificate.

Correct Answer: A

CompTIA A+ Core 2 Question B-15

The type of security threat that uses computers or other networks to accept and pass on viruses is called:

A. phishing.
B. botnets.
C. logic bomb.
D. man-in-the-middle.

Correct Answer: B

CompTIA A+ Core 2 Question B-14

A technician has been tasked with disposing of hard drives that contain sensitive employee data. Which of the following would be the BEST method to use for disposing of these drives?

A. Recycling
B. Shredding
C. Overwriting
D. Reformatting

Correct Answer: B