CompTIA Core2 Practice Test JD Flashcards
Learn & Memorize
Question 43:
Your company recently downloaded and installed the latest audio card driver for all of its workstations. Now, several users have had their usernames and passwords for several websites compromised. You believe the two issues are related. If they are, which of the following was MOST likely contained in the audio card driver file that was installed?
A. Worm
B. Ransomware
C. Keylogger
D. Virus
Keylogger
Which of the following allows users to save their current session to disk and before powering down their Windows 10 laptop?
A. Hibernate
B. Sleep
C. Lock
D. Shutdown
A. Hibernate
Question 45:
Which of the following MacOS features allows the user to create a user account that is used to sign in to the App Store, iCloud, and iTunes?
A. Spotlight
B. Keychain
C. Apple ID
D. Passwd
Apple ID
Jason is building an inexpensive workstation for one of the employees at Dion Training. The workstation will utilize an Intel x86 processor. Which of the following editions of Windows will support installation on this workstation? (Choose all of the answers that apply)
A. Windows 10 Enterprise
B. Windows 10 Pro
C. Windows 11 Home
D. Windows 11 Pro
Windows 10 Enterprise
Windows 10 Pro
Jason wants to configure his Windows 10 laptop to suspend individual USB ports when not in use. Which of the following Control Panel sections should he use to set the USB selective suspend feature?
A. Power Options
B. Indexing Options
C. File Explore Options
D. Internet Options
Power Option
Which version of Windows supports Virtual Desktops?
A. Windows 7
B. Windows 8
C. Windows 8.1
D. Windows 10
Windows 10
Which version of Windows 10 does not support BitLocker for full disk encryption?
A. Enterprise
B. Pro
C. Home
D. Education
C. Home
Dion Consulting Group has been hired by a small real estate office to build its network. The office has 4 computers running Windows 10 Professional edition configured in a workgroup to access a shared file server. Which of the following types of network models is being used by this real estate office?
A. Peer-to-Peer
B. Hub-an-Spoke
C. Client/Sever
D. Mesh
Peer-to-Peer
Question 51:
You are working as a service desk analyst. This morning, you have received multiple calls from users reporting that they cannot access websites from their work computers. You decide to troubleshoot the issue by opening up your command prompt on your Windows machine and running a program to determine where the network connectivity outage is occurring. This tool tests the end-to-end connection and reports on each hop found in the connection. Which tool should you use to determine if the issue is on the intranet portion of your corporate network or if it is occurring due to a problem with your ISP?
A. netstat
B. nslookup
C. ping
D. tracert
D. tracert
Which of the following Linux command-line options would shut down a Linux server 11 minutes from now?
A. shutdown 11:00
B. shutdown +11
C. shutdown now
D. shutdown @11
B. shutdown +11
Which type of authentication method is commonly used with physical access control systems and relies upon RFID devices embedded into a token?
A. Pre-shared Key
B. TOTP
C. Proximity Cards
D. HOTP
C. Proximity Cards
What is the minimum processor required to install Windows 10 (x86) on a device?
A. 1GHz single-core processor
B. 1GHz dual-core processor
C. 2 GHz single-core processor
D. 2 GHz dual-core processor D
A. 1 GHz single-core processor
Which of the following commands is used on a Linux system to edit a text file on a server?
A. ps
B. vi
C. chown
D. pwd
B. vi
Michael, a salesman, is on a business trip and is trying to access his corporate email over the hotel’s Wi-Fi network. Michael’s laptop appears to be connected to the hotel’s wireless network, but his email client cannot download any new messages and states, “Network Offline.” Michael contacts the help desk for assistance. What action should the help desk technician tell Michael to perform to solve this issue?
A. Perform a full system scan to see for malware his laptop.
B. Open a web browser, enter google.com, and see if a redirect page is displayed.
C. Disconnect and reconnect to the hotel’s wireless network.
D. Disable and reenable the wireless network adapter on his laptop.
B. Open a web browser, enter google.com, and see if a redirect page is displayed.
A technician at Dion Training wants to identify which version and build of Windows 10 is installed on a laptop. Which of the following commands should the technician enter at the command line?
A. pathping
B. net user
C. winver
D. gpresult
C. winver
Which of the following Windows 10 power options will turn off individual devices connected to a laptop to save energy?
A. Hibernate
B. Fast startup
C. Sleep
D. USB selective suspend
D. USB selective suspend
What is the minimum amount of memory required to install Windows 10 (x64) on a device?
A. 1 GB
B. 2 GB
C. 4 GB
D. 8 GB
B. 2 GB
Which type of installation would require an answer file to install the operating system?
A. Unattended
B. Repair
C. Clean
D. Upgrade
A. Unattended
Which of the following Control Panel options should a technician configure to automatically adjust the volume of different sounds when the computer is being used to place or receive telephone calls?
A. Program and Features
B. Sound
C. Ease of Access
D. USB selective suspend
B. Sound
A small doctor’s office has asked you to configure their network to use the highest levels of wireless security. The office only uses cloud-based SaaS applications to store their patient’s sensitive data. Which of the following protocols or authentication methods should you implement for the BEST security?
A. WPS
B. WPA2
C. WEP
D. WPA
B. WPA2
You work for Dion Training as a physical security manager. You are concerned that the physical security at the entrance to the company is not sufficient. To increase your security, you are determined to prevent piggybacking. What technique should you implement first?
A. Install CCTV to monitor the entrance
B. Install an access control vestibule at the entrance
C. Require all employees to security badges when entering the building
D. Install and RFID badge reader at the entrance
B. Install an access control vestibule at the entrance
Dion Training will be hiring 10 college students as interns to work over the summer. Each year, the same interns will work for the company for 8 weeks, but then they will return to school. Next summer, they will return to the company and will need to reaccess their accounts. What is the BEST policy to use so that the interns can use the accounts during the summer but cannot log in during the school year?
A. Delete the user account at the end of each summer
B. Disable the user accounts at the end of each summer
C. Restrict the user accounts using login hours
D. Reset the user accounts at the end of each summer
B. Disable user accounts at the end of each summer
Which of the following types of attacks is conducted by injecting malicious programming language statements into otherwise trustworthy websites to attack the user’s web browser?
A. Cross-site stitching
B. Zero-day attack
C. SQL injection
D. On-path attack
A. Cross-site stitching
Which of the following must be enabled to allow a video game console or VoIP handset to configure your firewall automatically by opening the IP addresses and ports needed for the device to function?
A. MDM
B. UPnP
C. NAT
D. DHCP
B. UPnP