220-902 CompTIA A+ Certification Practice Exam Set 3

A technician is configuring a SOHO wireless router for a small business with three employees.
After the three employeesí laptops have successfully connected to the wireless network, the
company would like to prevent additional access to the wireless network. The technician enables
WPA2 on the wireless router. Which of the following additional settings should the technician
change?


Options are :

  • Enable MAC filtering (Correct)
  • Disable SSID broadcast
  • Update router firmware
  • Reduce radio power level

Answer : Enable MAC filtering

A turnstile is an example of which of the following forms of physical security?


Options are :

  • Entry control roster
  • Biometrics
  • Cipher lock
  • Mantrap (Correct)

Answer : Mantrap

A customer has made several trouble calls to the help desk and is very irate. The technician that
receives the call has learned that the issue has not yet been resolved. The technician politely asks
the customer to explain the issue, and learns that the problem needs to be escalated. Which of the
following should the technician do once the problem has been escalated?



Options are :

  • Tell customer that patience will be needed
  • Inform the customer that the issue cannot be resolved at this level
  • Remain on the line until the issue is resolved
  • Communicate status with customer and ensure successful call transfer (Correct)

Answer : Communicate status with customer and ensure successful call transfer

N10-006 CompTIA Network+ Certification Practice Test Set 6

A user, Ann, receives a phone call from the companyís mail administrator who indicates her email
account has been disabled due to high volumes of emails being sent in a very short period of time.
Which of the following types of attack has the user experienced?


Options are :

  • Malware infection
  • Man-in-the-middle attack
  • Phishing attack
  • Virus infection (Correct)

Answer : Virus infection

Which of the following prevention methods is considered to be digital security?


Options are :

  • Biometrics
  • Mantrap
  • RFID badge
  • Firewalls (Correct)

Answer : Firewalls

Ann, a customer, reports that when she occasionally works in the office basement, her
smartphone battery drains faster than normal and she has poor cellular reception. Which of the
following is the reason for the fast battery drain?



Options are :

  • Weak signal (Correct)
  • Defective SD card
  • Malware
  • Unpaired Bluetooth

Answer : Weak signal

SY0-401 CompTIA Security+ Certification Practice Exam Set 8

A technician needs to quickly destroy data on several hard drives that are no longer wanted.
Which of the following methods is MOST effective?


Options are :

  • Physical destruction (Correct)
  • Overwrite
  • Quick format
  • Low level format

Answer : Physical destruction

A userís smartphone runs very slow at the end of the day. When the user restarts the phone in the
morning, it runs at its normal speed. Which of the following should be done throughout the day to
BEST resolve this issue?



Options are :

  • Close all running apps. (Correct)
  • Uninstall any unused apps.
  • Reset to the smartphone to factory default.
  • Charge the smartphone.

Answer : Close all running apps.

A technician has been tasked with disposing of hard drives that contain sensitive employee data.
Which of the following would be the BEST method to use for disposing of these drives?


Options are :

  • Reformatting
  • Shredding (Correct)
  • Overwriting
  • Recycling

Answer : Shredding

N10-006 CompTIA Network+ Certification Practice Test Set 7

Joe, a user, has connected a tablet to his personal mobile hot-spot device in a public location for
Internet access. The device display indicates there are two connections instead of just one. Which
of the following actions can he perform to prevent this unauthorized access to the device
immediately? (Select TWO).
A.
Change the SSID to a different broadcast name
B.
Add the intruding device to a blocked access list
C.
Access the intruderís device and shut it down
D.
Shut down the device until the intruder is no longer in the area
E.
Set up a WiFi analyzer to identify the intruding device


Options are :

  • B,E
  • A,B (Correct)
  • D,E
  • A,B,C

Answer : A,B

A customer reports that a smartphone is experiencing a very short battery life. The user has been
using this phone for a short time and has installed several apps recently. Which of the following
might be the cause of the issue?



Options are :

  • Unauthorized root access (Correct)
  • Defective SD card
  • Slow data speeds
  • Signal drop or weak signal

Answer : Unauthorized root access

A user wants to save a file into another userís directory, but the file save is denied. Which of the
following is the MOST likely reason the file save cannot be completed?


Options are :

  • The user must be a member of the Administrators group
  • The user requires read permission to the folder
  • The user requires write permissions to the folder (Correct)
  • The user must be a member of the Users group

Answer : The user requires write permissions to the folder

CompTIA N10-004 Network+ Certification Practice Test Set 8

A technician receives a call regarding a PCís slow performance. The client states that most
applications are slow to respond; boot up and shutdown take much longer than they used to. Hard
drive diagnostics pass, but there are error messages in the event viewer stating that the file
system is corrupt. Which of the following should the technician do NEXT?



Options are :

  • Run chkdsk with the /r switch and reboot the PC. (Correct)
  • Reload the OS using FAT32 instead of NTFS.
  • Change the disk from basic to dynamic.
  • Open the defrag utility and run a drive analysis.

Answer : Run chkdsk with the /r switch and reboot the PC.

A user leaves the workstation frequently and does not want sensitive material to be accessed. In
addition, the user does not want to turn off the computer every time in the evening. Which of the
following is the BEST solution for securing the workstation?


Options are :

  • Run a screensaver after one minute of nonuse and fingerprint lock for afterhours.
  • Set a strong password that requires a renewal every 30 days.
  • Apply a screen lock after five minutes of nonuse and login time restrictions for afterhours (Correct)
  • Require a password and fingerprint lock afterhours.

Answer : Apply a screen lock after five minutes of nonuse and login time restrictions for afterhours

A customer is reporting a burning smell coming from a CRT monitor. Which of the following should
be taken into consideration before attempting to resolve the customerís issue?


Options are :

  • Disconnect power before inspecting the CRT power supply
  • CRT monitors should be serviced by qualified personnel (Correct)
  • Wear safely goggles to protect from the cathodes
  • Have compressed air available to clear out the debris

Answer : CRT monitors should be serviced by qualified personnel

SY0-401 CompTIA Security+ Certification Practice Exam Set 5

A technician is configuring wireless for a home office. The customer wants to prevent others from
accessing the wireless network. The customer has a small number of devices on the network and
does not want to have to remember a complicated password. Which of the following should the
technician recommend?


Options are :

  • Enable MAC filtering (Correct)
  • Disable SSID broadcast
  • Turn on content filtering
  • Assign static IP addresses

Answer : Enable MAC filtering

Joe, a user, is using his smartphone for navigation while driving. As he drives, an icon frequently
appears on the screen informing the user additional information is required to log in. Which of the
following is causing this?



Options are :

  • Weak cellular signal
  • Unintended WiFi connections (Correct)
  • Cellular data roaming notifications
  • Unintended Bluetooth connections

Answer : Unintended WiFi connections

A networked PC has started to display adware pop-ups when the user opens the browser. Which
of the following best practices should the technician employ FIRST when responding to the
problem?



Options are :

  • Schedule scans and run updates in safe mode
  • Quarantine the system (Correct)
  • Disable System Restore
  • Create a System Restore point

Answer : Quarantine the system

HT0-201 CEA- CompTIA DHTI+ Certification Practice Exam Set 6

An end-user is attempting to access a file-sharing site to download files shared by a customer, but
is receiving a message stating the site has been blocked. Which of the following is the MOST
likely cause of this issue?


Options are :

  • Internet connectivity issues
  • Ransomware infection
  • Antivirus software
  • Content-filtering (Correct)

Answer : Content-filtering

Which of the following is the BEST license type to comply with end user licensing agreement
(EULA) terms for commercial software used by multiple users in a corporate environment?


Options are :

  • Enterprise license (Correct)
  • Commercial license
  • Open source license
  • Seat license

Answer : Enterprise license

A user reports unexpected icons appearing on the desktop. The technician identifies that the
symptoms point to a malware infection. Which of the following procedures would be performed
NEXT?


Options are :

  • Report the issue to the information security officer
  • Schedule scans and run updates
  • Quarantine infected system (Correct)
  • Disable System Restore (in Windows)

Answer : Quarantine infected system

SY0-401 CompTIA Security+ Certification Practice Exam Set 9

A user updates the video driver on the computer and it requests a restart after installation. The
computer never gets past the loading Windows page without rebooting. Which of the following
should the technician use to resolve this issue without losing any vital files or programs?



Options are :

  • Emergency Repair Disk
  • Restore from OEM image
  • Restore from backup
  • System Recovery (Correct)

Answer : System Recovery

A technician is configuring a SOHO router to ensure network computers can only use secured
protocols on the Internet. Which of the following ports should be allowed?


Options are :

  • 3269
  • 443 (Correct)
  • 23
  • 143

Answer : 443

A customer has recently installed several applications on a Windows 7 workstation and is now
experiencing slow system performance and spontaneous restarts. After removing some of the
recently installed applications, the issue persists. Which of the following tools could the technician
use to troubleshoot the problem while preventing data loss?


Options are :

  • msconfig (Correct)
  • SecureBoot
  • Factory restore
  • diskpart

Answer : msconfig

JK0-015 CompTIA E2C Security+ 2008 Edition Practice Exam Set 9

Joe, a user, returned yesterday from a trip where he utilized the GPS function of his mobile device.
He now notices the battery is rapidly draining. Which of the following can Joe MOST likely do to
resolve the issue without a loss of data?


Options are :

  • Uninstall the GPS-enabled app.
  • Update the deviceís firmware.
  • Restart the mobile device.
  • Readjust the location settings. (Correct)

Answer : Readjust the location settings.

Ann, a user, states that after installing an update on her iPhone, the WiFi starts to malfunction.
The WiFi icon is displaying that it has connectivity but she is still unable to browse. Which of the
following could be the issue?



Options are :

  • PRAM needs to be reset (Correct)
  • The router needs to be rebooted
  • iCloud is corrupted
  • The upgrade needs to be uninstalled

Answer : PRAM needs to be reset

A technician has upgraded four computers and would like to securely repurpose the hard drives
for later use. Which of the following should the technician do to the drives to prepare them for later
use?


Options are :

  • Degauss
  • Quick format
  • chkdsk
  • Drive wipe (Correct)

Answer : Drive wipe

CompTIA JK0-022 E2C Security+ Network Security Practice Exam Set 6

After installing a critical update from Windows Update, a user accidentally types an incorrect URL
into the browser and malware is automatically installed. The malware disables the computerís
antivirus software and Internet connection. Which of the following would be the BEST tool to
remove the malware without risking loss of the userís data?


Options are :

  • Reinstall Windows with the Repair Option
  • Run System Restore (Correct)
  • Run System File Checker
  • Reinstall Windows on top of itself

Answer : Run System Restore

A user advises that a computer is displaying pop-ups when connected to the Internet. After
updating and running anti-malware software, the problem persists and the technician finds that two
rogue processes cannot be killed. Which of the following should be done NEXT to continue
troubleshooting the problem?



Options are :

  • Run Event Viewer to identify the cause
  • Run System Restore to revert to previous state
  • Run Recovery Console to kill the processes
  • Run msconfig to clean boot the computer (Correct)

Answer : Run msconfig to clean boot the computer

A technician has just fixed a userís PC and successfully removed a virus and malware from the
machine. Which of the following is the LAST thing the technician should do?



Options are :

  • Educate the user regarding Internet browsing best practices (Correct)
  • Schedule scans and run updates
  • Update the anti-malware software on the userís PC
  • Enable system restore and create restore point

Answer : Educate the user regarding Internet browsing best practices

CompTIA Network+ 6 Certification Practice Exams - 2019 Set 15

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions