Skip to main content

A+ Core 2 Practice Test (V15)

Dive into practice questions

Question 1

A user cannot access company resources on their new workstation that they could access on their prior workstation. Which of the following actions should a technician take to fix the issue?

A. Provide the user with the administrator account.

B. Disable the firewall on the workstation. 

C. Join the workstation to the company's domain.

D. Enable facial recognition on the workstation. 

Question 2

An IT support specialist is preparing to migrate a critical application. This migration will impact the operations during the maintenance window. Which of the following would help the specialist determine the potential impact to the business as part of the change management process? 

A. End user acceptance

B. Risk assessment

C. Manager approval

D. Peer review

Question 3

Which of the following is a type of malware designed to record a user's credentials and other entries?

A. Keylogger 

B. Trojan 

C. Ransomware

D. Rootkit

Question 4

A team member provides a link to an online slide deck presentation so other team members can add to the presentation. The link does not work for any of the other team members. Which of the following should the team check first

A. Version history

B. Web browser compatibility

C. Viewing and sharing permissions

D. License management 

Question 5

A user is purposely deleting files and folders containing company information. Which of the following describes this attack?

A. Whaling

B. On-path attack

C. Insider threat

D. Spoofing

Question 6

A technician is reviewing malicious activity on a machine. The timestamp information shows this activity takes place overnight. Which of the following should the technician do to prevent further occurrences?

A. Disable guest accounts.

B. Restrict log-in times. 

C. Apply an account expiration date. 

D. Enable screensaver locks.

Question 7

Which of the following best describes what happens when an OS reaches the EOL date? 

A. Users are unable to log on.

B. Users cannot purchase the OS.

C. Security updates are not released.

D. New drivers must be installed.

Question 8

A technician is replacing a laptop's motherboard that is covered by a warranty. The technician must return the faulty motherboard to the manufacturer as part of the warranty agreement. Which of the following should the technician do after removing the old motherboard and installing the new one?

A. Connect an ESD wrist strap to a grounded connection point. 

B. Remove the battery and AC adapter from the laptop.

C. Use compressed air to clean out any loose debris or dirt from inside the laptop. 

D. Place the old component in an antistatic bag for shipping.

Question 9

An IT help desk project that was to be completed in three days after work hours for another department is now two days overdue. The department leader is upset and wants to know when the project will be completed. Which of the following is the best approach in this scenario?  

A. Escalate to the management team without talking to the department leader.

B. Ask for an extension to the deadline.

C. Apologize for the delay and offer a viable solution.

D. Request the department leader provide the request in writing.

Question 10

An employee is receiving emails and calls from people in their contact list about phishing emails from the employee. The employee recently installed a third-party email client with access to the device's contacts. Which of the following should the employee do to resolve the issue immediately?  

A. Check employee's outgoing mailbox.

B. Uninstall the unapproved application.

C. Delete the contact list from the device.

D. Add the messages to Junk Mail.

Answer key

Question 1:(Join the workstation to the company's domain.)

Question 2:(Risk assessment)
Question 3:(Keylogger)
Question 4:(Viewing and sharing permissions)
Question 5:(Insider threat)
Question 6:(Restrict log-in times.)
Question 7:(Security updates are not released.)
Question 8:(Place the old component in an antistatic bag for shipping.)
Question 9:(Apologize for the delay and offer a viable solution.)

Question 10:(Uninstall the unapproved application.)