CompTIA A+ Core 2 Question I-24

The folder “Documents” is shared. The user can create and delete documents when on the local PC, but can only read documents when accessing them remotely. Which of the following should be adjusted?

A. Read Only Attribute
B. Share Permissions
C. Firewall Settings
D. NTFS Permissions

CompTIA A+ Core 2 Question H-53

Peter, an end user, has reported that his computer is extremely slow for several minutes after logging in. He has noticed that many unnecessary programs automatically start when he logs into his computer. Which of the following tools could the technician use to prevent the unnecessary programs from starting automatically when Peter logs into his computer?

A. Performance Monitor
B. Task Scheduler
C. MSCONFIG
D. Windows Firewall

Correct Answer: C

CompTIA A+ Core 2 Question H-28

A technician needs to change the minimum password length to 8 characters to make it more secure. Which of the following system settings should the technician configure?

A. Windows Firewall
B. Windows Security Center
C. Local Security Policy
D. System Configuration

CompTIA A+ Core 2 Question G-66

A technician installs a new SOHO wireless router to replace a failed router and users report connectivity issues and IP errors. Which of the following is the MOST likely cause?

A. Their server has gone down
B. There are too many static IP addresses on the network
C. The new routers firewall is malfunctioning
D. Users need to refresh their IP configuration

Correct Answer: D

CompTIA A+ Core 2 Question G-11

A user has a perimeter firewall and up-to-date antivirus software. The user is asking what else they can do to improve their security. Which of the following will have the MOST impact on network security? (Select TWO).

A. Install additional antivirus software
B. Disable screen savers
C. Conduct a daily security audit
D. Assign security rights based on job roles
E. Use strong passwords

Correct Answer: DE

Explanation:
To improve security, assign security rights based on job roles. You need to give least amount of privilege to users so that they can do their jobs without having access to resources that have nothing to do with their job roles.

CompTIA A+ Core 2 Question F-100

A customer reports that after a technician cleaned up a rogue antivirus program, the customer cannot browse the web. Which of the following should the technician check to resolve the situation?

A. Browsing history
B. Firewall settings
C. User privileges
D. Proxy settings