OD41

5 November 2025

CompTIA A+ Core 2: PC Security Troubleshooting

 

Question:

Which tool can be used to assist with auditing post-incident baselines?

  • Microsoft Security Compliance Toolkit


Question

:

You are using the Microsoft Edge browser, by which means can you view and verify the details of a website’s certificate?

  • Click the padlock icon in the toolbar, choose Connection is secure


Question

:

False antivirus or malware alerts are typically generated by which component?

  • Browser


Question

:

Which option is NOT a feature of a password manager?

  • Enforce the minimum number of characters


Question

:

Which command can be used to determine which group policies have been received by your system?

  • gpresult /r


Question

:

Which aspect of dealing with security issues is a chain of custody primarily used for?

  • Preserving evidence


Question

:

Which component would you most likely suspect to have been corrupted if your system is continually redirected to suspicious websites while browsing?

  • Hosts file


Question

:

Place the phases of dealing with a security breach in the correct sequence.

  • Identification and logging

  • Containment and isolation

  • Eradication and recovery

  • Escalation and communication

  • Lessons learned


Question

:

Which command can be used to test connectivity to your domain controller if you suspect there are connectivity issues on the network?

  • nltest /dsgetdc