CompTIA Core 2 Practice PDF
Document Details
Tags
Summary
This document contains practice questions related to CompTIA Core 2. The questions cover a variety of topics, including computer networking, security, and troubleshooting.
Full Transcript
Comptia Core 2 Practice A user's smartphone data usage is well above average. The user suspects an installed application is transmitting data in the background. The user would like to be alerted when an application attempts to communicate with the internet. Which of the following BEST addre...
Comptia Core 2 Practice A user's smartphone data usage is well above average. The user suspects an installed application is transmitting data in the background. The user would like to be alerted when an application attempts to communicate with the internet. Which of the following BEST addresses the user's concern? Operating system updates Remote wipe Antivirus Firewall When a user calls in to report an issue, a technician submits a ticket on the user's behalf. Which of the following practices should the technician use to make sure the ticket is associated with the correct user? Have the user provide a callback phone number to be added to the ticket. Assign the ticket to the department's power user. Register the ticket with a unique user identifier. Provide the user with a unique ticket number that can be referenced on subsequent calls. A technician is setting up a SOHO wireless router. The router is about ten years old. The customer would like the most secure wireless network possible. Which of the following should the technician configure? WPA2 with TKIP WPA2 with AES WPA3 with AES-256 WPA3 with AES-128 A technician is troubleshooting an issue involving programs on a Windows 10 machine that are loading on startup but causing excessive boot times. Which of the following should the technician do to selectively prevent programs from loading? Right-click the Windows button, then select Run... entering shell:startup and clicking OK, and then move items one by one to the Recycle Bin. Remark out entries listed HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>Windows>CurrentVersion>Run. Manually disable all startup tasks currently listed as enabled and reboot, checking for issue resolution at startup. Open the Startup tab and methodically disable items currently listed as enabled and reboot, checking for issue resolution at each startup. A user contacted the help desk to report pop-ups on a company workstation, indicating the computer has been infected with 137 viruses and payment is needed to remove them. The user thought the company-provided antivirus software would prevent this issue. The help desk ticket states that the user only receives these messages when first opening the web browser. Which of the following steps would MOST likely resolve the issue? (Choose two.) Scan the computer with the company-provided antivirus software. Install a new hard drive and clone the user's drive to it. Deploy an ad-blocking extension to the browser. Uninstall the company-provided antivirus software. Click the link in the messages to pay for virus removal. Perform a reset on the user's web browser. A user's mobile phone has become sluggish. A systems administrator discovered several malicious applications on the device and reset the phone. The administrator installed MDM software. Which of the following should the administrator do to help secure the device against this threat in the future? (Choose two.) Prevent a device root. Disable biometric authentication. Require a PIN on the unlock screen. Enable developer mode. Block a third-party application installation. Prevent GPS spoofing A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by others. Which of the following applications should the technician use to assist the user with hiding the file? Device Manager Indexing Options File Explorer Administrative Tools A technician is replacing the processor in a desktop computer. Prior to opening the computer, the technician wants to ensure the internal components are protected. Which of the following safety procedures would BEST protect the components in the PC? (Choose two.) Utilizing an ESD strap Disconnecting the computer from the power source Ensuring proper ventilation Removing dust from the ventilation fans A technician found that an employee is mining cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. Which of the following should be updated to reflect this new requirement? MDM EULA IRP AUP Which of the following provide the BEST way to secure physical access to a data center server room? (Choose two.) Biometric lock Badge reader USB token Video surveillance Locking rack Access control vestibule A user is unable to log in to the domain with a desktop PC, but a laptop PC is working properly on the same network. A technician logs in to the desktop PC with a local account but is unable to browse to the secure intranet site to get troubleshooting tools. Which of the following is the MOST likely cause of the issue? Time drift Dual in-line memory module failure Application crash Filesystem errors A technician is asked to resize a partition on the internal storage drive of a computer running macOS. Which of the followings tools should the technician use to accomplish this task? Console Disk Utility Time Machine FileVault A user is experiencing frequent malware symptoms on a Windows workstation. The user has tried several times to roll back the state, but the malware persists. Which of the following would MOST likely resolve the issue? Quarantining system files Reimaging the workstation Encrypting the hard drive Disabling TLS 1.0 support A technician receives a call from a user who is unable to open Outlook. The user states that Outlook worked fine yesterday, but the computer may have restarted sometime overnight. Which of the following is the MOST likely reason Outlook has stopped functioning? Spam filter installation Invalid registry settings Malware infection Operating system update After a company installed a new SOHO router, customers were unable to access the company-hosted public website. Which of the following will MOST likely allow customers to access the website? Port forwarding Firmware updates IP filtering Content filtering An Android user contacts the help desk because a company smartphone failed to complete a tethered OS update. A technician determines there are no error messages on the device. Which of the following should the technician do NEXT? Verify all third-party applications are disabled. Determine if the device has adequate storage available. Check if the battery is sufficiently charged. Confirm a strong internet connection is available using Wi-Fi or cellular data. A call center handles inquiries into billing issues for multiple medical facilities. A security analyst notices that call center agents often walk away from their workstations, leaving patient data visible for anyone to see. Which of the following should a network administrator do to BEST prevent data theft within the call center? Encrypt the workstation hard drives. Lock the workstations after five minutes of inactivity. Install privacy screens. Log off the users when their workstations are not in use. A police officer often leaves a workstation for several minutes at a time. Which of the following is the BEST way the officer can secure the workstation quickly when walking away? Use a key combination to lock the computer when leaving. Ensure no unauthorized personnel are in the area. Configure a screensaver to lock the computer automatically after approximately 30 minutes of inactivity. Turn off the monitor to prevent unauthorized visibility of information. While browsing a website, a staff member received a message that the website could not be trusted. Shortly afterward, several other colleagues reported the same issue across numerous other websites. Remote users who were not connected to corporate resources did not have any issues. Which of the following is MOST likely the cause of this issue? A bad antivirus signature update was installed. A router was misconfigured and was blocking traffic. An upstream internet service provider was flapping. The time or date was not in sync with the website. A systems administrator is tasked with configuring desktop systems to use a new proxy server that the organization has added to provide content filtering. Which of the following Windows utilities is the BEST choice for accessing the necessary configuration to complete this goal? Security and Maintenance Network and Sharing Center Windows Defender Firewall Internet Options An analyst needs GUI access to server software running on a macOS server. Which of the following options provides the BEST way for the analyst to access the macOS server from the Windows workstation? RDP through RD Gateway Apple Remote Desktop SSH access with SSH keys VNC with username and password A user turns on a new laptop and attempts to log in to specialized software, but receives a message stating that the address is already in use. The user logs on to the old desktop and receives the same message. A technician checks the account and sees a comment that the user requires a specifically allocated address before connecting to the software. Which of the following should the technician do to MOST likely resolve the issue? Bridge the LAN connection between the laptop and the desktop. Set the laptop configuration to DHCP to prevent conflicts. Remove the static IP configuration from the desktop. Replace the network card in the laptop, as it may be defective A user calls the help desk to report potential malware on a computer. The anomalous activity began after the user clicked a link to a free gift card in a recent email. The technician asks the user to describe any unusual activity, such as slow performance, excessive pop-ups, and browser redirections. Which of the following should the technician do NEXT? Advise the user to run a complete system scan using the OS anti-malware application. Guide the user to reboot the machine into safe mode and verify whether the anomalous activities are still present. Have the user check for recently installed applications and outline those installed since the link in the email was clicked. Instruct the user to disconnect the Ethernet connection to the corporate network. A technician is troubleshooting a lack of outgoing audio on a third-party Windows 10 VoIP application. The PC uses a USB microphone connected to a powered hub. The technician verifies the microphone works on the PC using Voice Recorder. Which of the following should the technician do to solve the issue? Remove the microphone from the USB hub and plug it directly into a USB port on the PC. Enable the microphone under Windows Privacy settings to allow desktop applications to access it. Delete the microphone from Device Manager and scan for new hardware. Replace the USB microphone with one that uses a traditional 3.5mm plug. A suite of security applications was installed a few days ago on a user's home computer. The user reports that the computer has been running slowly since the installation. The user notices the hard drive activity light is constantly solid. Which of the following should be checked FIRST? Services in Control Panel to check for overutilization Performance Monitor to check for resource utilization System File Checker to check for modified Windows files Event Viewer to identify errors A field technician applied a Group Policy setting to all the workstations in the network. This setting forced the workstations to use a specific SNTP server. Users are unable to log in now. Which of the following is the MOST likely cause of this issue? The SNTP server is offline. A user changed the time zone on a local machine. The Group Policy setting has disrupted domain authentication on the system. The workstations and the authentication server have a system clock difference. A technician receives a call from a user who is on vacation. The user provides the necessary credentials and asks the technician to log in to the user's account and read a critical email that the user has been expecting. The technician refuses because this is a violation of the: acceptable use policy. regulatory compliance requirements. non-disclosure agreement. incident response procedures. A user is attempting to browse the internet using Internet Explorer. When trying to load a familiar web page, the user is unexpectedly redirected to an unfamiliar website. Which of the following would MOST likely solve the issue? Updating the operating system Changing proxy settings Reinstalling the browser Enabling port forwarding An administrator has submitted a change request for an upcoming server deployment. Which of the following must be completed before the change can be approved? Risk analysis Sandbox testing End user acceptance Lesson Learned A macOS user reports seeing a spinning round cursor on a program that appears to be frozen. Which of the following methods does the technician use to force the program to close in macOS? The technician presses the Ctrl+Alt+Del keys to open the Force Quit menu, selects the frozen application in the list, and clicks Force Quit. The technician clicks on the frozen application and presses and holds the Esc key on the keyboard for 10 seconds which causes the application to force quit. The technician opens Finder, navigates to the Applications folder, locates the application that is frozen in the list, right-clicks on the application, and selects the Force Quit option. The technician opens the Apple icon menu, selects Force Quit, selects the frozen application in the list, and clicks Force Quit. A technician connects an additional monitor to a PC using a USB port. The original HDMI monitor is mounted to the left of the new monitor. When moving the mouse to the right from the original monitor to the new monitor, the mouse stops at the end of the screen on the original monitor. Which of the following will allow the mouse to correctly move to the new monitor? Rearranging the monitor's position in display settings Swapping the cables for the monitors Using the Ctrl+Alt+=> to correct the display orientation Updating the display drivers for the video card A user is unable to use any internet-related functions on a smartphone when it is not connected to Wi-Fi. When the smartphone is connected to Wi-Fi, the user can browse the internet and send and receive email. The user is also able to send and receive text messages and phone calls when the smartphone is not connected to Wi-Fi. Which of the following is the MOST likely reason the user is unable to use the internet on the smartphone when it is not connected to Wi-Fi? The smartphone's line was not provisioned with a data plan The smartphone's SIM card has failed. The smartphone's Bluetooth radio is disabled The smartphone has too many applications open A technician suspects the boot disk of a user’s computer contains bad sectors. Which of the following should the technician verify in the command prompt to address the issue without making any changes? Run sfc / scannow on the drive as the administrator Run cleanmgr on the drive as the administrator Run chkdsk on the drive as the administrator Run dfrgui on the drive as the administrator A BSOD appears on a user’s workstation monitor. The user immediately presses the power button to shut down the PC, hoping to repair the issue. The user then restarts the PC, and the BSOD reappears, so the user contacts the help desk. Which of the following should the technician use to determine the cause? Stop code Event Viewer Services System Configuration While assisting a customer with an issue, a support representative realizes the appointment is taking longer than expected and will cause the next customer meeting to be delayed by five minutes. Which of the following should the support representative do NEXT? Send a quick message regarding the delay to the next customer. Cut the current customer's time short and rush to the next customer. Apologize to the next customer when arriving late. Arrive late to the next meeting without acknowledging the time. A new service desk is having a difficult time managing the volume of requests. Which of the following is the BEST solution for the department? Implementing a support portal Creating a ticketing system Commissioning an automated callback system Submitting tickets through email A network administrator is deploying a client certificate to be used for Wi-Fi access for all devices in an organization. The certificate will be used in conjunction with the user's existing username and password. Which of the following BEST describes the security benefits realized after this deployment? Multi Factor authentication will be forced for Wi-Fi. All Wi-Fi traffic will be encrypted in transit. Eavesdropping attempts will be prevented. Rogue access points will not connect. A user in a corporate office reports the inability to connect to any network drives. No other users have reported this issue. Which of the following is the MOST likely reason the user is having this issue? The user is not connected to the VPN. The file server is offline. A low battery is preventing the connection. The log-in script failed. A junior administrator is responsible for deploying software to a large group of computers in an organization. The administrator finds a script on a popular coding website to automate this distribution but does not understand the scripting language. Which of the following BEST describes the risks in running this script? The instructions from the software company are not being followed. Security controls will treat automated deployments as malware. The deployment script is performing unknown actions. Copying scripts off the internet is considered plagiarism. A user opened a ticket regarding a corporate-managed mobile device. The assigned technician notices the OS is several versions out of date. The user is unaware the OS version is not current because auto-update is turned on. Which of the following is MOST likely the cause of the issue? The device does not have enough free space to download the OS updates. The device needs user confirmation to update to a major release. The device is not compatible with the newest version of the OS. The device is restricted from updating due to a corporate security policy A technician receives a ticket indicating the user cannot resolve external web pages. However, specific IP addresses are working. Which of the following does the technician MOST likely need to change on the workstation to resolve the issue? Default gateway Host address Name server Subnet mask An administrator has received approval for a change request for an upcoming server deployment. Which of the following steps should be completed NEXT? Perform a risk analysis. Implement the deployment. Verify end user acceptance. Document the lessons learned. A user calls the help desk to report that Windows installed updates on a laptop and rebooted overnight. When the laptop started up again, the touchpad was no longer working. The technician thinks the software that controls the touchpad might be the issue. Which of the following tools should the technician use to make adjustments? eventvwr.msc perfmon.msc gpedit.msc devmgmt.msc Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined. Which of the following should be performed FIRST to prevent further damage to the host and other systems? Power off the machine. Run a full antivirus scan. Remove the LAN card. Install a different endpoint solution. A technician has been tasked with troubleshooting audiovisual issues in a conference room. The meeting presenters are unable to play a video with sound. The following error is received: The Audio Driver is not running. Which of the following will MOST likely resolve the issue? compmgmt.msc regedit.exe explorer.exe taskmgr.exe gpmc.msc services.msc A technician installed a new application on a workstation. For the program to function properly, it needs to be listed in the Path Environment Variable. Which of the following Control Panel utilities should the technician use? System Indexing Options Device Manager Programs and Features A systems administrator is setting up a Windows computer for a new user. Corporate policy requires a least privileged environment. The user will need to access advanced features and configuration settings for several applications. Which of the following BEST describes the account access level the user will need? Power user account Standard account Guest account Administrator account A technician downloads a validated security tool and notes the vendor hash of a11e11a1. When the download is complete, the technician again validates the hash, but the value returns as 2a222a2b2. Which of the following is the MOST likely cause of the issue? Private-browsing mode Invalid certificate Modified file Browser cache A company needs to securely dispose of data stored on optical discs. Which of the following is the MOST effective method to accomplish this task? Degaussing Low-level formatting Recycling Shredding A user receives a notification indicating the data plan on the user's corporate phone has reached its limit. The user has also noted the performance of the phone is abnormally slow. A technician discovers a third-party GPS application was installed on the phone. Which of the following is the MOST likely cause? The GPS application is installing software updates. The GPS application contains malware. The GPS application is updating its geospatial map data. The GPS application is conflicting with the built-in GPS. A malicious file was executed automatically when a flash drive was plugged in. Which of the following features would prevent this type of incident? Disabling UAC Restricting local administrators Enabling UPnP Turning off AutoPlay A desktop engineer is deploying a master image. Which of the following should the desktop engineer consider when building the master image? (Choose two.) Device drivers Keyboard backlight settings Installed application license keys Display orientation Target device power supply Disabling express charging A technician installed an application on a user's desktop and received an error message. Which of the following tools can the technician use to research the error? Resource Monitor > CPU > Services Task Manager > Processes > Apps Event Viewer > Windows Logs > Application Device Manager > Computer A technician is configuring a new Windows laptop. Corporate policy requires that mobile devices make use of full disk encryption at all times. Which of the following encryption solutions should the technician choose? Encrypting File System File Vault BitLocker Encrypted LVM A user is being directed by the help desk to look up a Windows PC's network name so the help desk can use a remote administration tool to assist the user. Which of the following commands would allow the user to give the technician the correct information? (Choose two.) ipconfig /all hostname netstat /? nslookup localhost arp -a ping ::1 A technician installs specialized software on a workstation. The technician then attempts to run the software. The workstation displays a message indicating the software is not authorized to run. Which of the following should the technician do to MOST likely resolve the issue? Grant permissions to the installation directory. Attach the external hardware token. Install OS updates. Restart the workstation after installation A team of support agents will be using their workstations to store credit card data. Which of the following should the IT department enable on the workstations in order to remain compliant with common regulatory controls? (Choose two.) Encryption Antivirus AutoRun Guest accounts Default passwords Backups A technician is working to resolve a Wi-Fi network issue at a doctor's office that is located next to an apartment complex. The technician discovers that employees and patients are not the only people on the network. Which of the following should the technician do to BEST minimize this issue? Disable unused ports. Remove the guest network. Add a password to the guest network. Change the network channel A user's system is infected with malware. A technician updates the anti-malware software and runs a scan that removes the malware. After the user reboots the system, it once again becomes infected with malware. Which of the following will MOST likely help to permanently remove the malware? Enabling System Restore Educating the user Booting into safe mode Scheduling a scan A user needs assistance installing software on a Windows PC but will not be in the office. Which of the following solutions would a technician MOST likely use to assist the user without having to install additional software? VPN MSRA SSH RDP A user receives a notification indicating the antivirus protection on a company laptop is out of date. A technician is able to ping the user's laptop. The technician checks the antivirus parent servers and sees the latest signatures have been installed. The technician then checks the user's laptop and finds the antivirus engine and definitions are current. Which of the following has MOST likely occurred? Ransomware Failed OS updates Adware Missing system files A user is unable to access files on a work PC after opening a text document. The text document was labeled “URGENT PLEASE READ.txt - In active folder,.txt file titled urgent please read”. Which of the following should a support technician do FIRST? Quarantine the host in the antivirus system. Run an antivirus scan for malicious software. Investigate how malicious software was installed. Reimage the computer. A technician is troubleshooting an issue that requires a user profile to be rebuilt. The technician is unable to locate Local Users and Groups in the MMC console. Which of the following is the NEXT step the technician should take to resolve the issue? Run the antivirus scan. Add the required snap-in. Restore the system backup. Use the administrator console. A user updates a mobile device's OS. A frequently used application becomes consistently unresponsive immediately after the device is launched. Which of the following troubleshooting steps should the user perform FIRST? Delete the application's cache. Check for application updates. Roll back the OS update. Uninstall and reinstall the application. Which of the following wireless security features can be enabled to allow a user to use login credentials to attach to available corporate SSIDs? TACACS+ Kerberos Preshared key WPA2/AES Which of the following would MOST likely be used to change the security settings on a user's device in a domain environment? Security groups Access control list Group Policy Login script A technician needs to manually set an IP address on a computer that is running macOS. Which of the following commands should the technician use? ipconfig ifconfig arpa Ping A user called the help desk to report an issue with the internet connection speed on a laptop. The technician thinks that background services may be using extra bandwidth. Which of the following tools should the technician use to investigate connections on the laptop? nslookup net use netstat net user Which of the following operating systems is considered closed source? Ubuntu Android CentOS OSX Which of the following should be used to secure a device from known exploits? Encryption Remote wipe Operating system updates Cross-site scripting Each time a user tries to go to the selected web search provider, a different website opens. Which of the following should the technician check FIRST? System time IP address DNS servers Windows updates A technician is creating a tunnel that hides IP addresses and secures all network traffic. Which of the following protocols is capable of enduring enhanced security? DNS IPS VPN SSH