220-802 CompTIA A+ Certification Practice Exam Set 9

Joe, a technician, is asked to set up a wired kiosk laptop for office visitors to use for Internetaccess only. Which of the following would be MOST important in securing this type of setup?

Options are :

  • Requiring personal information be entered before use
  • Setting a strong password for all kiosk accounts
  • Restricting user permissions for the kiosk account
  • Disabling the administrator account
  • Changing the default usernames for all kiosk accounts

Answer : Restricting user permissions for the kiosk account

CompTIA JK0-022 E2C Security Data & Host Security Exam Set 2

Which of the following provides protection against DDoS attacks?

Options are :

  • UAC
  • Antivirus
  • RFID badge
  • Firewall

Answer : Firewall

A company has replaced all computers in their accounting department. Due to the sensitive natureof the department, company management has decided to remove and destroy all hard drives priorto donating the computers to a local charity. Now that the drives are removed, which of thefollowing is the MOST efficient method of destroying the hard drives to prevent sensitiveinformation from being leaked?

Options are :

  • Overwriting
  • Degaussing
  • Drive wiping
  • Formatting

Answer : Degaussing

Which of the following would a technician use to install applications onto an iPad? (Select TWO).A. App StoreB. Market PlaceC. iTunesD. ExchangeE. Mobile Market

Options are :

  • A,C
  • B,C
  • A,B
  • D,E

Answer : A,C

CompTIA Cyber Security Analyst (CySA+) Practice Exams 2019 Set 12

Which of the following OS based features limits access to a workstation? (Select TWO).A. User permissionsB. Strong passwordsC. Employee badgesD. Privacy filtersE. MAC filtering

Options are :

  • C,D
  • A,B
  • B,C
  • D,E

Answer : A,B

When comparing laptops and tablet PCs which of the following is true?

Options are :

  • Tablets typically use solid state drives
  • Laptops typically use touch screen displays
  • Tablets typically have higher resolution displays
  • Laptops typically have a longer battery life

Answer : Tablets typically use solid state drives

Which of the following mobile device sync methods is easiest for the end user but requires moreconfiguration on the part of the technician?

Options are :

  • Encrypted wired sync
  • Wired sync
  • Dock sync
  • Wireless sync

Answer : Wireless sync

CompTIA JK0-022 Security Cryptography Certification Exam Set 6

Which of the following software types would need to be installed on a mobile device to helpprevent data from being viewed if the device is lost?

Options are :

  • Remote wipe
  • Antivirus
  • Remote backup application
  • GPS locator

Answer : Remote wipe

A SOHO network with nine workstations all connected to a switch is located in a room that visitorscan enter. A technician wants to make the network secure from visitors. Which of the followingwould be the BEST solution?

Options are :

  • Disable all unused ports on the switch
  • Create strong network usernames and passwords
  • Ask administration to label the room off limits to visitors
  • Enable QoS settings

Answer : Disable all unused ports on the switch

Which of the following BEST describes the Apple utility used with iOS devices to synchronize,upgrade, and restore to factory default if needed?

Options are :

  • Safari
  • iMac
  • Bluetooth
  • iTunes

Answer : iTunes

CAS-001 CompTIA Advanced Security Practitioner Practice Exam Set 2

Which of the following mobile device features disables cellular and wireless communication?

Options are :

  • Pairing Mode
  • Airplane Mode
  • Settings Reset
  • Hotspot Mode

Answer : Airplane Mode

A user has a laptop that they need to get ready for an outdoor presentation. The user is concernedthat the laptop will turn off the screen or go into standby before their presentation is complete.Which of the following Control Panel paths should the technician use in order to prevent this fromoccurring?

Options are :

  • System -> Advanced -> Performance
  • Power Options -> Hibernate
  • System -> Hardware
  • Power Options -> Power Schemes

Answer : Power Options -> Power Schemes

Which of the following is typically the MOST difficult security threat to remove?

Options are :

  • Trojan
  • Rootkit
  • Virus
  • Spyware

Answer : Rootkit

CompTIA CA1-001 Advanced Security Practitioner Practice Exam Set 5

Which of the following types of physical security features a passcode generated from analgorithm?

Options are :

  • RFID Badge
  • RSA Token
  • Biometrics
  • Key Fob

Answer : RSA Token

A user wants to prevent access to specific websites to prevent their children from accidentlyaccessing them. Which of the following can be implemented?

Options are :

  • Antispyware software
  • A firewall
  • Antivirus software
  • A switch

Answer : A firewall

A user states they constantly get pop-ups on their workstations asking them to buy a product.Which of the following is this known as?

Options are :

  • Malware
  • Shoulder surfing
  • Social engineering
  • Phishing

Answer : Malware

Practice : CompTIA Network+ (N10-007)

A user is concerned about an issue with iOS. The user MOST likely has which of the followingdevices?

Options are :

  • Android Phone
  • iPhone
  • iCloud
  • Windows Tablet

Answer : iPhone

A website that attempts to mimic a bank website with malicious intent is known as which of thefollowing?

Options are :

  • Malware
  • Phishing
  • Social engineering
  • Shoulder surfing

Answer : Phishing

Which of the following is the MOST secure method, short of physical destruction, that would beused to ensure that data on a hard drive cannot be recovered?

Options are :

  • Format the drive
  • Repartition the drive
  • Use a degaussing tool
  • Use an overwrite program

Answer : Use an overwrite program

CompTIA Project+ (PK0-004) 5 Practice Test 2019 Set 2

A technician is tasked with implementing the principle of least privilege to secure a file server sothat only authorized users can modify company documents. Which of the following should thetechnician implement to comply with the request?

Options are :

  • Create a folder hierarchy, disable inheritance and assign user's permissions to specific folders.
  • Create a shared folder and grant full administrative rights only to the users who need to modify company documents.
  • Create a shared folder and only provide read access to all users regardless of their role.
  • Create a folder tree hierarchy, enable inheritance and assign user's permissions to specific folders.

Answer : Create a folder hierarchy, disable inheritance and assign user's permissions to specific folders.

A home user has forgotten their password and cannot log into their Windows XP Home PC. Theydo not want to lose any information. Which of the following should be used FIRST, assuming thatthe user had set up the PC?

Options are :

  • Use third party software to change password
  • Restart in safe mode and log in as administrator
  • Re-install the OS from the resource CD
  • Log in as administrator from start up screen

Answer : Restart in safe mode and log in as administrator

Laptops and tablets have which of the following in common?

Options are :

  • Solid state drives
  • Not upgradable
  • Contain an accelerometer
  • No field serviceable parts

Answer : Solid state drives

220-902 CompTIA A+ Certification Practice Exam Set 6

While configuring a new email application that uses POP3 for a customer, the techniciandetermines the firewall is blocking the traffic. Which of the following ports should be opened toallow POP3 mail traffic through the firewall?

Options are :

  • 443
  • 53
  • 110
  • 3389

Answer : 110

Which of the following are characteristics of a strong password? (Select TWO).A. Hard to guess.B. Cannot be reversed.C. Uses dictionary words.D. Uses special characters.E. Can be encrypted.

Options are :

  • C,E
  • A,B
  • C,D
  • A,D

Answer : A,D

By disabling DHCP and allowing only static IP address assignments, which of the following willoccur? (Select TWO).A. The domain controller will require additional RAMB. Devices without static IP addresses cannot connect to the networkC. IP address assignments will be consistent over timeD. Crosstalk will be reduced on the networkE. Network traffic and congestion will increase over timeF. A gateway will be required for every Ethernet port

Options are :

  • E,F
  • B,C
  • C,D
  • A,B

Answer : B,C

FC0-U41 CompTIA Strata IT Fundamentals Practice Test Set 3

A customer reports that their wireless laptop cannot connect after removing it from its carryingcase. The laptop boots and the user is able to log in. Which of the following should be checkedFIRST?

Options are :

  • External antenna switch
  • Status in Device Manager
  • Available hard drive space
  • Laptop battery levels

Answer : External antenna switch

A user installed a new SOHO router and new wireless NICs to increase their transmission speedfrom 802.11b to 802.11g with the manufacturer's default settings. The user lives in an apartmentbuilding and is still experiencing slowness to the Internet after the installations. Which of thefollowing is the MOST secure option that a technician could implement to resolve this issue?

Options are :

  • Assign static IP addresses
  • Disable the WAN port
  • Enable MAC filtering
  • Hide the SSID

Answer : Enable MAC filtering

Joe, a user, reports that random pages are being printed on his printer. Which of the following canmitigate this from occurring?

Options are :

  • Change the network frequency
  • Enable static IP's
  • Change the default encryption key
  • Disable the SSID broadcasting

Answer : Change the default encryption key

CompTIA JK0-801 A+ Networking & PC Hardware Practice Exam Set 9

A user just bought an Android tablet and wants to connect to their work email. The user’semployer has a Microsoft Exchange server for email. Which of the following would the technicianconfigure to allow the user to access email on the Android tablet?

Options are :

  • POP3, SMTP
  • Devices are incompatible

Answer : POP3, SMTP

A user has not received any new emails on their smartphone in the last two days. The user is ableto access the Internet without any problems. Which of the following should the user do FIRST?

Options are :

  • Reconfigure the smartphone email account
  • Restart the smartphone
  • Update the operating system
  • Resynchronize the smart phone

Answer : Restart the smartphone

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions