Start your tech career with CompTIA A+, the industry standard certification for entry-level roles. Trusted by employers worldwide, A+ builds foundational skills in hardware, software, networking, troubleshooting, and security. The latest version, V15, is updated for today’s technology and prepares you for roles like IT support specialist and help desk technician through two exams—Core 1 and Core 2.
---------- Question 1
An employee receives an email that appears to be from their bank, stating that their account has been compromised and they must click a link to verify their credentials. The link leads to a website that looks identical to the bank's actual login page. What type of social engineering attack is this?
- Whaling, because it targets a specific high-value individual.
- Phishing, because it is a deceptive email sent to a broad audience.
- Shoulder surfing, because the attacker is watching the user type.
- Vishing, because the attack is conducted over a voice call.
---------- Question 2
A system administrator needs to automate the backup of specific log files from several Linux servers to a central storage location every night at 2:00 AM. The administrator wants to use a built-in utility that can handle scheduling without manual intervention. Which of the following tools should the administrator use to accomplish this task?
- The 'tar' command combined with a bash script
- The 'cron' service with a properly configured crontab
- Task Manager's background processes tab
- The 'sudo' command to elevate permissions for the copy
---------- Question 3
A company is implementing a new security policy that requires Multi-Factor Authentication (MFA) for all employees accessing the corporate network remotely. An employee uses their username and password, followed by a one-time passcode generated by an app on their smartphone. Which of the following MFA categories are being utilized in this specific scenario?
- Something you know and something you have
- Something you are and something you know
- Something you do and somewhere you are
- Something you have and something you are
---------- Question 4
A technician is tasked with disposing of several old hard drives that contained sensitive corporate financial data. The company's policy requires that the data be completely unrecoverable by any means before the physical drives are recycled. Which of the following methods is the most effective for ensuring the data is permanently destroyed?
- Formatting the drives using a Quick Format
- Using a degausser to disrupt the magnetic fields
- Deleting the partitions in Disk Management
- Moving all files to the Recycle Bin and emptying it
---------- Question 5
A startup company wants to deploy a new application but does not want to manage the underlying operating systems, hardware, or runtime environments. They require a cloud model that allows their developers to simply upload their code and let the provider handle the scaling and infrastructure. Which cloud service model best fits this description, and what is the typical role of a Type 1 hypervisor in this environment?
- Infrastructure as a Service (IaaS); the hypervisor runs as an application on a host OS.
- Software as a Service (SaaS); the hypervisor is managed by the end user via a web portal.
- Platform as a Service (PaaS); the hypervisor runs directly on the bare metal hardware.
- Desktop as a Service (DaaS); the hypervisor manages the virtual desktop infrastructure (VDI).
---------- Question 6
A mobile user is frustrated because their smartphone apps are frequently crashing and the overall interface is sluggish. The technician has already cleared the app cache and checked for available storage. What is the next logical step to troubleshoot a potentially misbehaving application or OS service?
- Perform a hard reset to wipe all user data.
- Perform a soft reset by restarting the device.
- Root or jailbreak the device to access system logs.
- Uninstall the operating system and reinstall it from a USB drive.
---------- Question 7
An executive reports that their corporate-issued smartphone is experiencing rapid battery drain and is extremely hot to the touch even when not in active use. The technician notices that the device is constantly searching for a signal and that several unauthorized applications are running in the background. Which of the following represents the most effective sequence of troubleshooting steps to resolve the immediate hardware stress and identify the root cause?
- Replace the lithium-ion battery immediately to prevent a thermal event and then perform a factory reset of the operating system.
- Enable Airplane Mode to stop cellular searching, check the battery usage statistics for rogue apps, and uninstall any suspicious third-party software.
- Place the device in a localized cooling chamber to reduce temperature and then update the PRL and baseband firmware to improve signal.
- Disable the GPS and Bluetooth radios while clearing the system cache partition to free up processing cycles and reduce heat output.
---------- Question 8
A user is attempting to run a legacy application on their Windows 11 computer, but the application fails to start and displays an error regarding an unsupported operating system version. The user needs to access data within the app urgently. Which of the following Windows features would be the most effective for running this application without reinstalling a different OS?
- Run the application in Compatibility Mode
- Use the Task Manager to set high priority
- Enable the Windows Subsystem for Linux
- Perform a System Restore to an earlier date
---------- Question 9
A business traveler is using a corporate-issued smartphone in a foreign country. Although the device is unlocked and supports the local cellular frequency bands, the user can make phone calls but cannot access any data services or browse the internet. The technician suspects that the device needs specific configuration settings to communicate with the local carrier's gateway. Which of the following should the technician modify on the device to resolve this connectivity issue?
- The Access Point Name or APN settings
- The Preferred Roaming List or PRL database
- The International Mobile Subscriber Identity or IMSI
- The Baseband Radio Firmware version
---------- Question 10
A network technician is investigating a report of slow internet speeds in a small branch office. After testing the wall jack with a cable tester, the technician finds that pins 1 and 2 and pins 3 and 6 are correctly mapped, but there is high near-end crosstalk (NEXT). Which of the following is the most probable cause of this interference?
- The cable is too long and exceeds the 100-meter limit
- The wires are untwisted too far at the termination point
- The cable is running parallel to a high-voltage power line
- The patch cable being used is a crossover cable instead of straight-through
Are they useful?
Click here to get 540 more questions to pass this certification at the first try! Explanation for each answer is included!
Follow the below LINKEDIN channel to stay updated about 89+ exams!

Comments
Post a Comment