Inspirational journeys

Follow the stories of academics and their research expeditions

Comptia A+ 1002 2023 Questions and answer - Part 29

Mary Smith

Wed, 09 Jul 2025

Comptia A+ 1002 2023 Questions and answer - Part 29

1. Which of the following file types should be opened when executing a PowerShell script?

A) A. .bat
B) B. .vbs
C) C. .sh
D) D. .ps1
E) E. .psd


2. A customer is pressuring a project manager to get things done on time. Which of the following has the project manager failed to do in this case?

A) A. Follow up with the customer after project completion
B) B. Maintain a positive attitude during the project.
C) C. Disclose project experiences on social media
D) D. Communicate with the customer clearly.



3. An employee contacts the help desk because the battery in a company-provided smartphone lasts only a short period of time when the worker is in the office. Which of the following would MOST likely reduce this symptom? (Select TWO).(Select 2answers)

A) A. Close applications when tasks are completed.
B) B. Increase the time to dim the screen automatically.
C) C. Increase the frequency for syncing corporate email.
D) D. Set the smartphone display to maximum brightness.
E) E. Connect to the office WiFi network automatically.
F) F. Disable 802.11ac and use mobile data exclusively.

4. Which of the following BEST describes the Guest account on a Windows system?

A) A. This account is designed to have the ability to set permissions for other users on the system. Users of this account have the capability to perform any operation or task on the system.
B) B. This account is designed to provide basic permission for completing common daily tasks. Users of this account are restricted from performing things like installing new software.
C) C. This account is designed for users who require specific administrator rights or permissions. Users of this account are restricted from installing software but can change time zones.
D) D. This account is designed for users who require temporary access to a computer and do not need to store user-specific settings. Users of this account have very limited permissions.



5. Which of the following threats uses personalized information in an attempt at obtaining information?

A) A. Whaling
B) B. Impersonation
C) C. Spoofing
D) D. Spear phishing



1. Right Answer: D
Explanation:

2. Right Answer: D
Explanation:

3. Right Answer: A,E
Explanation:

4. Right Answer: D
Explanation:

5. Right Answer: D
Explanation:

0 Comments

Leave a comment