Inspirational journeys

Follow the stories of academics and their research expeditions

Comptia A+ 1002 2023 Questions and answer - Part 24

Mary Smith

Thu, 15 May 2025

Comptia A+ 1002 2023 Questions and answer - Part 24

1. With which of the following types is a man-in-the-middle attack associated?

A) A. Brute force
B) B. Spoofing
C) C. DDoS
D) D. Zero-day



2. After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked with limiting removable hard drive access to certain network users. USB ports are used for many devices, including scanners, printers, and signature pads, so a policy is created to deny access to removable hard drives only. When testing the policy, a removable drive is plugged in but can still be accessed.Which of the following command-line tools should the technician use to apply the new policy?

A) A. grupdate
B) B. diskpart
C) C. gpresult
D) D. net use



3. A desktop technician is attempting to upgrade several machines to Windows 10. After releasing there is only one disc for the installation, the technician decides to upgrade over the network. Which of the following boot methods initiates such an upgrade?

A) A. SSD
B) B. Optical drive
C) C. Flash drive
D) D. PXE



4. A network administrator wants to plan a major OS upgrade of the router, which acts as a default gateway in an organization. The administrator has documented the purpose of the change, scoped the change, and completed a comprehensive risk analysis. Which of the following is an important part of the change request process for which the administrator still must plan?

A) A. Inform management regarding the anticipated amount of downtime
B) B. Document a backout plan to roll back changes to the router
C) C. Configure a redundant data path to eliminate downtime
D) D. Make the downtime window larger than actually anticipated



5. A company brings in contractors several times a year to perform inventory, and the contractors use company-supplied laptops. The company-s security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory. Which of the following BEST enforces this policy?

A) A. Delete the user accounts
B) B. Disable the user accounts
C) C. Restrict the user accounts
D) D. Reset the user accounts



1. Right Answer: B
Explanation:

2. Right Answer: A
Explanation:

3. Right Answer: D
Explanation:

4. Right Answer: B
Explanation:

5. Right Answer: B
Explanation:

0 Comments

Leave a comment