CompTIA A+ Core 2 Question F-6

A technician is taking apart a laptop in order to replace an internal part. During this process, which of the following represents a best practice?

A. Only perform the work on a plastic counter top
B. Never use a power tool to remove screws from the case
C. Label the screws according to where they came from
D. When working on the bottom of a laptop, always leave the screen open

Correct Answer: C

Explanation:
http://www.fonerbooks.com/laptop13.htm

CompTIA A+ Core 2 Question D-91

Which of the following areas of a file system should a standard user have restricted permissions to in order to promote a security best practice? (Select TWO).

A. Temporary Internet Files
B. My Document Files
C. Windows System Files
D. Network Files
E. Program Files

Correct Answer: CE

Explanation:
Windows program files are important for Windows operating system. If these files are deleted, Windows will corrupt. Similarly program files are related to applications and programs installed on a computer. These are highly sensitive files because they are related to the functioning of the operating system and the applications installed on it.

CompTIA A+ Core 2 Question D-23

Which of the following security best practices would prevent a program on a CD from immediately launching when inserted into a computer?

A. MSCONFIG >Startup Tab
B. Disable the Guest account
C. Rename the Administrator account
D. Disable autorun
E. Restrict user permissions

CompTIA A+ Core 2 Question B-18

A networked PC has started to display adware pop-ups when the user opens the browser. Which of the following best practices should the technician employ FIRST when responding to the problem?

A. Disable System Restore
B. Schedule scans and run updates in safe mode
C. Quarantine the system
D. Create a System Restore point

Correct Answer: C

CompTIA A+ Core 2 Question B-17

A user, Jane, has reported that she lost a laptop. The laptop had sensitive corporate information on it that has been published on the Internet. Which of the following is the FIRST step in implementing a best practice security policy?

A. Require biometric identification to log into the laptop.
B. Require multifactor authentication to log into laptop.
C. Require laptop hard drives to be encrypted.
D. Require users to change their password at frequent intervals.
E. Require users to have strong passwords.

Correct Answer: C

CompTIA A+ Core 2 Question A-80

A user calls the helpdesk reporting that when accessing the company portal, it redirects to an unfamiliar website. Which of the following steps would the technician take to resolve this issue using best practices?

A. Identify symptoms, quarantine infected system, and create restore point.
B. Quarantine infected system, identify symptoms, and create restore point.
C. Identify symptoms, educate end user, and create restore point.
D. Create restore point, identify symptoms, and quarantine infected system.

Correct Answer: A

CompTIA A+ Core 2 Question A-62

A technician has just fixed a user’s PC and successfully removed a virus and malware from the machine. Which of the following is the LAST thing the technician should do?

A. Educate the user regarding Internet browsing best practices
B. Update the anti-malware software on the user’s PC
C. Schedule scans and run updates
D. Enable system restore and create restore point

Correct Answer: A

CompTIA A+ Core 2 Question A-28

A technician has just upgraded RAM on a user’s workstation from 4GB to 8GB. The technician now wants to adjust the page file size on the system to the recommended Microsoft settings. Which of the following should be entered for the “Min” portion of the page file setting if using these best practices?

A. 4096MB
B. 8192MB
C. 12288MB
D. 16328MB

Correct Answer: C