CompTIA A+ (Core 2) Practice Questions

Answer Explanation:

Journaling is a feature in file systems designed to improve fault tolerance and protect data integrity. It works by keeping a log (or journal) of changes before they are actually made to the file system. This helps recover data and prevent corruption in case of unexpected crashes, power failures, or system errors. Essentially, it’s like a safety net for your data.

The file systems that support journaling are:

NTFS: The default file system for Windows, known for its reliability and advanced features.
APFS: Apple's modern file system, used in macOS and iOS, which includes journaling to safeguard metadata.

ext3: A Linux file system that introduced journaling, making it a popular choice for improved data safety.

ext4: The successor to ext3, with enhanced journaling features and better performance.

However, FAT32 and exFAT do not support journaling. These file systems prioritize compatibility and simplicity but lack the fault tolerance that journaling provides.

So, next time your CEO asks for a robust file system, recommend NTFS (if it's Windows) or APFS (if it's a Mac). And remember—journaling won't save your job, but it might save their data!

1 / 35

Your favorite IT-savvy co-worker just got fired because the CEO's (Donald Trumps) computer crashed and lost data. Now Trump is asking you for a file system with journaling (and maybe one that can also save your job). Which of the following file systems should you suggest?

To see the correct answer for multiple selection questions, click the "i" icon at the top of the question.

2 / 35

You want to prank your friend by replacing their desktop wallpaper with a desktop full of tiny cursor images to confuse them. Where should you go on their computer to pull off this masterpiece?

Correct Answers:
1️⃣, 3️⃣, 4️⃣, 5️⃣, 7️⃣

Because while Cortana might have moves, she’s not programmed to dance yet... or order pizza. 🍕

Additionally, password complexity rules are usually setup in the Local Security Policy window or Group Policy Editor window.

3 / 35

You're exploring the mystical "User Accounts" screen on a Windows PC. What is its purpose? (Select all that apply... if you dare!)

4 / 35

You’re explaining backup strategies to a coworker who insists their only backup is "the cloud and good vibes." To test your own knowledge, which of the following correctly describes the difference between the 3-2-1 backup rule and the Grandfather-Father-Son backup rule?

5 / 35

You’ve just completed identifying and quarantining the malware on a user’s computer. According to CompTIA A+ Malware Removal Best Practices, what’s your next step?

6 / 35

You’re removing malware from a computer following CompTIA A+ procedures. After disconnecting the system from the network and booting into Safe Mode, you notice the malware has humorously renamed itself "I'M_NOT_A_VIRUS.exe." What’s your NEXT step?

7 / 35

Which of the following best describes the key behavioral difference between a virus and other forms of malware?

8 / 35

Your company just implemented a Single Sign-On (SSO) solution to simplify user access across multiple systems. This new system securely authenticates users without repeatedly asking for passwords and protects against password-based attacks like replay attacks. Which protocol is behind this secure ticket-based authentication system?

9 / 35

A fellow co-worker in your IT department has been nicknamed "Captain Typo" & "Sudo-Don't" because anytime they enter a command in the command line, they usually cause problems. If they enter the "Sudo" (AKA "Super User Do") command, they will usually end up accidentally deleting an important file or something worse. Indeed, it is not uncommon to find them slamming their keyboard when their commands don't work. Never mind the fact that they never spell anything correctly.

As the System Administrator, which of the following could you use to ensure this IT user can only use safe commands? You would also like to have a way to remotely authenticate users and track who is logged in to which systems at all times.

10 / 35

You need to authenticate remote users connecting to your network, and you want a protocol that is efficient, lightweight, and capable of combining authentication and accounting. However, you don’t need granular control over what commands users can execute. Which protocol do you choose?

11 / 35

Your phone just flipped the screen upside down because you were lying on the couch like a potato. Which sensor is to blame for this sorcery?

12 / 35

Your quirky small business, “All Things In Bread” (a sandwich shop we promise) keeps suffering from short power outages. Making matters worse, there are not many who want to buy your "In Bread" products. What’s the best solution to keep things running smoothly?

13 / 35

You just downloaded a 5GB file that took forever, and you want to make sure it’s not corrupted or tampered with. What’s the best way to check?

14 / 35

Your SSD holds all your deepest, darkest secrets (like that time you googled “how to boil water”). What’s the most secure way to destroy it so no one can recover your data?

15 / 35

Which of the following might secretly keep your IT security team awake at night, clutching their coffee mugs in fear?

16 / 35

In your office, Bob from accounting leaves his computer unlocked every time he goes to grab yet another coffee. Why is enabling auto screen saver locks and timeouts important?

17 / 35

You’re tired of remembering 57 different passwords, so you embrace SSO. What’s the real benefit of SSO?

18 / 35

Your boss hands you a 57-page AUP. What’s the real purpose of this ancient scroll?

19 / 35

Your phone holds your deepest secrets: texts, memes, and way too many selfies. What’s the most secure way to keep snoopers (and your nosy cousin) out?

20 / 35

Dixon Kuntz has been promoted the IT manager of your department. He has since hidden a stack of adult magazines in the server room. He has now asked you what’s the most secure way to make sure no unauthorized humans, raccoons, or rogue coffee cups gain entry?

21 / 35

You just bought a fancy new app that Apple really doesn’t trust because it didn’t come from their walled garden. How do you convince your Mac to chill out and let you install it anyway?

22 / 35

You work for the US Department of Defense and need to update a Top Secret software application on a computer. Unfortunately, you only have a DVD and the computer has no DVD drive. What do you do?

23 / 35

Which file system is most likely found on a Linux workstation?

24 / 35

A user decided to "tinker" in Control Panel because nothing ever goes wrong when you do that, right? Now they can’t see other devices on their network, but their internet connection is stronger than their denial. What setting did they most likely mess up?

25 / 35

You're the Grinch, and you've infiltrated Santa's workshop. You've turned one of the Windows workstations into a ticking time bomb set to ruin Christmas! 🎄💣 But wait—the workstation's time is wrong, and if you don't sync it properly, the bomb might go off during Santa's coffee break instead of when he's loading the sleigh! Which option do you use to sync the time so you can perfectly ruin Christmas?

The correct answer is:

1. Check "See Hidden Files," because the best hiding spot is the one everyone forgets to check.

2. Open root file permissions and adjust them, because rules were made to be rewritten

On a Windows computer, the root file system is hidden by default, and one must check "Show Hidden Files" in order to see the Operating System files at the root directory of the system. Additionally, one must also have the correct permissions in order for them to see these files.

The other answers are incorrect. BIOS does not grant access to everything. There is also no way to access the root files from the terminal / command line if the user does not have the correct permissions.

26 / 35

Detective Debug has caught a criminal named Folder Felon trying to hide files in the "root" of the system. Detective Debug knows the evidence is hidden but needs your help to reveal it.

As the tech assisting Detective Debug, what steps should he take to gain access to the evidence in the root file system? (Select 2)

To see the correct answer explanation for checkbox style questions, click the "i" icon above the question.

27 / 35

A user wants to tweak their Wi-Fi connection settings, but instead of asking politely, they dive headfirst into the Windows settings like they're Indiana Jones looking for the Ark of Connectivity. Where should they actually go to adjust these settings?

28 / 35

You’re a tech wizard trying to connect to a computer in a SOHO for remote troubleshooting, but you’re hitting a wall. What’s the most likely culprit?

29 / 35

A customer complains that their computer applications are acting like teenagers—randomly freezing, refusing to open, and generally being uncooperative. What tool would you use to figure out what's going on?

30 / 35

You’ve been called to troubleshoot a network issue and found this setup:

IP: 192.168.0.120

Gateway: 192.168.0.1

Subnet Mask: 255.255.255.255

What’s the problem here?

31 / 35

You’re the IT support staff for a strip club, and Caramel Latte, the newest employee, needs access to the share drive \\TwerkStation\MusicLibrary to update her playlist for the weekend. Which command do you use to make it happen?

32 / 35

You're tasked with setting up a shared drive and creating user accounts for a strip club. Which command should you use to create Carmel Latte's user account?

33 / 35

You just wrote the next Great American Novel and want to encrypt the file so your psycho girlfriend doesn't try to hold you ransom for it. You're using a Windows computer. What's the best option to secure it?

34 / 35

As a covert operative, you are tasked with infiltrating a secure nuclear facility. You have a USB drive containing a critical file named "stuxnet.exe" that could disable the facility's nuclear capabilities. However, you receive intelligence that your location is about to be searched, and you must delete the file from the USB drive to avoid detection. What Windows command should you use?

35 / 35

You’ve stumbled upon a folder titled "Karaoke Nights: Shower Edition (Audio Only)" and it must be deleted before anyone questions your rendition of "Bohemian Rhapsody." Which Windows command will you use?

Your score is

The average score is 0%

0%