220-802 CompTIA A+ Certification Practice Exam Set 5

When using a PC on a Windows Domain, which of the following is the MOST critical service whenconnecting to multiple file, print, and email servers?


Options are :

  • Computer Browser Service
  • DNS Service (Correct)
  • Internet Connection Sharing Service
  • Windows Firewall Service

Answer : DNS Service

JK0-017 CompTIA E2C Project+ Certification Practice Exam Set 11

Which of the following can preserve permissions when copying files from one volume to another?(Select TWO).A. DISKPARTB. RobocopyC. CopyD. SFCE. XCOPY


Options are :

  • A,B
  • B,E (Correct)
  • C,D
  • A,D

Answer : B,E

Which of the following file systems has a 4GB file size limit?


Options are :

  • FAT32 (Correct)
  • NTFS
  • FAT
  • CDFS

Answer : FAT32

A technician is interested in running a test to see how much latency exists between a workstationand device at 10.0.0.15. Which of the following command line tools could be used to accomplishthis?


Options are :

  • NETSTAT 10.0.0.15
  • IPCONFIG 10.0.0.15
  • PING 10.0.0.15 (Correct)
  • NSLOOKUP 10.0.0.15

Answer : PING 10.0.0.15

CompTIA N10-004 Network+ Certification Practice Test Set 11

A technician is implementing a SOHO wireless network for Company A that shares a floor withCompany B. Which of the following would BEST secure the wireless network so that onlyCompany A employees are allowed access?


Options are :

  • Setting a high encryption level
  • Turning down the radio power level
  • Disabling the SSID broadcast
  • Enabling MAC filtering (Correct)

Answer : Enabling MAC filtering

When running a combination of full and incremental backups, which of the following represents therequired tapes in order to completely restore a system?


Options are :

  • The system cannot be restored completely using full and incremental backups.
  • Only the latest full backup is required.
  • Only the latest incremental backup is required.
  • The latest full and all incremental backups since the last full backup. (Correct)

Answer : The latest full and all incremental backups since the last full backup.

Anne, a lab administrator, is setting up the computer lab with multiple workstations and wants tominimize the amount of time to configure each workstation. Which of the following would allow forAnne to configure a single workstation?


Options are :

  • ROBOCOPY
  • Image deployment (Correct)
  • Multiboot
  • System Restore

Answer : Image deployment

CompTIA Security+ Certification (SY0-501): Sample Tests

A Windows XP computer is displaying an error that states "virtual memory is running low". Whichof the following tabs in the system Control Panel is used to reconfigure virtual memory settings?


Options are :

  • Remote settings
  • Advanced (Correct)
  • Hardware
  • Remote desktop

Answer : Advanced

Which of the following statements BEST describes client-side virtualization?


Options are :

  • Creating a software-based machine inside the physical machine (Correct)
  • Using a virtual reality interface to access the client
  • Using another machine to improve the performance of the current machine
  • Creating a virtual desktop PC to assist with building a new machine

Answer : Creating a software-based machine inside the physical machine

Which of the following items differentiates Windows 7 Enterprise from Windows 7 Ultimate?


Options are :

  • Can use Bitlocker encryption
  • Can join an Active Directory domain
  • Requires volume licensing (Correct)
  • Supports Multilingual User Interface

Answer : Requires volume licensing

Mock : CompTIA Network+ (N10-007)

A user has been reporting their computer is running slow on Fridays after being used all week. Atechnician believes the problem can be resolved by rebooting the computer. Using the shutdowncommand in the command prompt on the remote computer, which of the following switches wouldthe technician use to reboot the computer?


Options are :

  • -a
  • -s
  • -r (Correct)
  • –i

Answer : -r

A user receives an unsolicited call from a technician claiming to be from a Microsoft certifiedpartner. The technician tricks the user into allowing them access to their PC because of malwarealerts that were being broadcasted. Which of the following attacks is this user a victim of?


Options are :

  • Phishing attack
  • Social engineering (Correct)
  • Shoulder surfing
  • Malware infection

Answer : Social engineering

A technician wants to test out Windows 7 before deploying it on a workstation. Which of thefollowing must be completed FIRST in order to run Windows 7 from a bootable USB drive?


Options are :

  • Format the USB drive to FAT16 file format
  • Copy over the boot.ini file
  • Create a primary partition and make it active (Correct)
  • Copy over the config.sys file

Answer : Create a primary partition and make it active

JK0-015 CompTIA E2C Security+ 2008 Edition Practice Exam Set 10

A technician enabled remote management on the small office WAP to manage this device fromanother location. Users are reporting that the WAP has changed its SSID without anyone’sknowledge. Which of the following would prevent this from occurring?


Options are :

  • Enable static IP addresses
  • Change default usernames and passwords (Correct)
  • Disable the SSID from broadcasting
  • Change to user MAC filtering

Answer : Change default usernames and passwords

An administrator is concerned about users accessing network shares outside of their job role.Which of the following would BEST prevent this?


Options are :

  • Prevent remote logins to all network shares and drives.
  • Implement a written policy addressing the issue for all users.
  • Set up shares with permissions based upon group membership. (Correct)
  • Monitor access to the network shares using SNMP.

Answer : Set up shares with permissions based upon group membership.

A company is looking to donate a collection of old PCs that are no longer needed. Which of thefollowing data destruction methods would be MOST secure for highly sensitive information?


Options are :

  • Low level 3-pass random wipe
  • High level format 10 times
  • Low level 7-pass random wipe (Correct)
  • Simple 1-pass zero overwrite

Answer : Low level 7-pass random wipe

CompTIA Security+ SY0 401 Test Set 1

In order to prevent read errors on a hard drive, which of the following maintenance tools should beset to a regular schedule?


Options are :

  • Disk Defragmentation
  • System Backup
  • Check Disk (Correct)
  • Windows Update

Answer : Check Disk

Which of the following would be the QUICKEST means of removing data from a hard drive, whenthere is no consideration regarding the total destruction of the data?


Options are :

  • Overwrite program
  • Standard format (Correct)
  • Drive wipe
  • Low level format

Answer : Standard format

Which of the following is TRUE about the difference between a worm and a virus?


Options are :

  • Viruses hide in the boot record while worms hide within the file system.
  • Worms are written in assembly while viruses are written with scripting languages.
  • Viruses disable the antivirus update service while worms kill the antivirus process.
  • Worms self-propagate while viruses need human intervention to replicate. (Correct)

Answer : Worms self-propagate while viruses need human intervention to replicate.

SK0-004 CompTIA Server+ Certification Practice Exam Set 4

A technician is tasked with improving the security of a SOHO network. The office is comprised of asingle wireless router located under the front desk where the office manager sits. All desktopcomputers are wired into the router which is configured with strong device credentials.Additionally, wireless is disabled on the router. Which of the following should the technicianperform NEXT to improve the security of the SOHO network?


Options are :

  • Change the router’s default admin name and password.
  • Enable WPA2 wireless encryption.
  • Place the router in a locked room. (Correct)
  • Disable the router’s remote management feature.

Answer : Place the router in a locked room.

Which of the following should a technician implement to prevent external contractors fromphysically plugging devices into the company’s network jacks unless such jacks are designated forguest use?


Options are :

  • Disable DHCP and assign a static IP address to each network device physically connected to the network.
  • Place guest network jacks in public areas and all other jacks in secure areas as needed.
  • Enable MAC address filtering across all network jacks and record the MAC address of guest devices.
  • Disable all switch ports when they are not utilized and enable them on an as needed basis. (Correct)

Answer : Disable all switch ports when they are not utilized and enable them on an as needed basis.

Which of the following is MOST effective in preventing security breaches on a network? (SelectTHREE).A. Bandwidth throttlingB. Eliminate password historyC. Enable QoSD. Antivirus softwareE. User educationF. Enforced login/logoff hours


Options are :

  • A,B,C
  • A,D,F
  • A,C,E
  • D,E,F (Correct)

Answer : D,E,F

SY0-401 CompTIA Security+ Certification Practice Exam Set 5

Which of the following requirements must be considered when implementing virtual servers withsensitive information?


Options are :

  • Firewall
  • DMZ
  • Security (Correct)
  • Network

Answer : Security

user has a damaged file and has problems booting up. Which of the following is the BESTchoice to repair a corrupted Windows XP boot file?


Options are :

  • BOOTREC
  • FIXBOOT (Correct)
  • FORMAT
  • FDISK

Answer : FIXBOOT

Which of the following identifies traffic based upon its physical network address?


Options are :

  • MAC filtering (Correct)
  • Geotracking
  • Phishing
  • Hashing

Answer : MAC filtering

JK0-015 CompTIA E2C Security+ 2008 Edition Practice Exam Set 3

Which of the following areas of a file system should a standard user have restricted permissions toin order to promote a security best practice? (Select TWO).A. Temporary Internet FilesB. My Document FilesC. Windows System FilesD. Network FilesE. Program Files


Options are :

  • A,B
  • D,E
  • C,E (Correct)
  • C,D

Answer : C,E

Which of the following utilities would a technician use on a Windows Vista or Windows 7 machineto configure what applications are allowed to send/receive data over the LAN connection?


Options are :

  • Users and Groups
  • Windows Firewall (Correct)
  • Task Scheduler
  • Registry Editor

Answer : Windows Firewall

After several passes with a malware removal program, the program keeps detecting the samemalware infection after a reboot. Which of the following should be done to attempt to remove theoffending malware?


Options are :

  • Run the malware removal program while disconnected from the Internet
  • Run the malware removal program in Windows Safe Mode (Correct)
  • Reinstall the malware removal program from a trusted source
  • Set the malware removal program to run each time the computer is rebooted

Answer : Run the malware removal program in Windows Safe Mode

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 19

C$ is an example of which of the following?


Options are :

  • Local share
  • Mapped network drive
  • Inheritance
  • Administrative share (Correct)

Answer : Administrative share

Which of the following optical drives is the MINIMUM required to install Windows 7 Professionalfrom optical media?


Options are :

  • DVD-ROM drive (Correct)
  • DVD-RW drive
  • Blu-ray drive
  • CD-ROM drive

Answer : DVD-ROM drive

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions