BR0-003 CompTIA A+ 2009 Edition Bridge Practice Exam Set 3

Which of the following attacks are computer threats that try to exploit computer applicationvulnerabilities that are unknown to others or undisclosed to the software developer?


Options are :

  • Zero-day
  • FMS
  • Spoofing
  • Buffer overflow

Answer : Zero-day

You dial-in to your Internet Service Provider (ISP) but do not connect successfully. You try to dialinfrom another computer and have the same problem. What is the most likely cause?Each correct answer represents a complete solution. Choose all that apply.A. Defective parallel portB. Bad phone lineC. Defective serial portD. Noise on the phone line


Options are :

  • B,D
  • B,C
  • C,D
  • A,B

Answer : B,D

JK0-017 CompTIA E2C Project+ Certification Practice Exam Set 10

Which of the following is a version of netcat with integrated transport encryption capabilities?


Options are :

  • Nikto
  • Socat
  • Encat
  • Cryptcat

Answer : Cryptcat

Which of the following is a group of people who prepare for and respond to any emergencyincident, such as a natural disaster or an interruption of business operations?





Options are :

  • Incident response team
  • Incident command team
  • Incident management team
  • Incident investigation team

Answer : Incident response team

Minimum security controls can only be determined after___________.

A.



Options are :

  • . A vulnerability assessment.
  • The aggregate CIA score has been computed.
  • A penetration test.
  • System security policies are put in place.

Answer : The aggregate CIA score has been computed.

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 18

A customer has brought you a PC to fix. The symptoms seem most likely to point to a quick fix,such as a hard drive defragmentation - that would only take an hour or two to fix. However, it ispossible, though less likely, that a more serious problem exists that could take as much as twodays to fix. What should you tell the customer?


Options are :

  • . Tell them it will take at least three days.
  • Tell them you have no idea how long it will take and would not know until you doFurther testing.
  • . Tell them it will probably be ready in a few hours.
  • . Tell them there are two possible causes and depending on which one, could take a few hours, or as long as two days.

Answer : . Tell them there are two possible causes and depending on which one, could take a few hours, or as long as two days.

Mark works as a Network Security Administrator for uCertify Inc. Mark has been assigned to a taskto test the network security of the company. He created a webpage to discuss the progress of thetests with employees who were interested in following the test. Visitors were allowed to click on acompany's icon to mark the progress of the test. Mark successfully embeds a keylogger. He alsoadded some statistics on the webpage. The firewall protects the network well and allows strictInternet access. How was security compromised and how did the firewall respond?




Options are :

  • The attack was Cross Site Scripting and the firewall blocked it.
  • The attack was social engineering and the firewall did not detect it.
  • Security was compromised as keylogger is invisible for firewall.
  • Security was not compromised as the webpage was hosted internally.

Answer : The attack was social engineering and the firewall did not detect it.

You work as a Network Administrator for Infonet Inc. Rick, a Sales Manager, reports that hiscomputer was working properly till last evening. However, when he turned on his computer hisorning, it displayed the following error message:Invalid System DiskWhat is the most likely cause


Options are :

  • . The computer is infected with virus
  • A non-bootable floppy disk is inserted in drive A:.
  • . Media failure on the hard disk drive. .
  • Floppy drive failure.

Answer : A non-bootable floppy disk is inserted in drive A:.

CompTIA JK0-801 A+ Certification Practical Exam Set 2

You work as a Network Administrator for Infonet Inc. The company uses Wired Equivalent Privacy(WEP) for wireless security. Who among the following can authenticate from the access point ofthe network?


Options are :

  • Only users within the company.
  • Only the administrator
  • Only users with the correct WEP key.
  • Anyone can authenticate.

Answer : Only users with the correct WEP key.

220-702 CompTIA A+ Practical Application Certification Exam Set 3

Your customer has reported a hard drive problem. The hard drive makes a grinding noise.What is the most likely cause?


Options are :

  • The BIOS needs updating.
  • The SCSI connection is faulty. .
  • The hard disk is corrupted.
  • There is a problem with the HDI (Head-to-Disk Interface). .

Answer : There is a problem with the HDI (Head-to-Disk Interface). .

Mark works as a Computer Service Technician. He goes out to handle a customer's service callregarding the malfunctioning of his computer. When should he close the service call?


Options are :

  • . When the customer signs the service papers
  • When he reaches the service location. .
  • When the problem in the computer is rectified. .
  • When the customer is satisfied with the solution.

Answer : When the customer is satisfied with the solution.

Which of the following ports cannot be used by a digital camera to connect to a computer?Each correct answer represents a complete solution. Choose three.A. SCSI portB. RS-232 serial portC. PS/2 portD. USB portE. Parallel port


Options are :

  • B,C,D
  • A,C,E
  • D,E,A
  • C,D,A

Answer : A,C,E

220-902 CompTIA A+ Certification Practice Exam Set 7

Which of the following are the advantages of Standby mode over Hibernate mode?Each correct answer represents a complete solution. Choose two.A. Lower power consumptionB. Shorter wake-up periodC. Longer wake-up periodD. No consumption of hard disk space


Options are :

  • B,D
  • A,B
  • C,D
  • A,C

Answer : B,D

You work as a Network Administrator for McRoberts Inc. The company has a Windows 2003Active Directory-based network. All client computers on the network run Windows Vista Ultimate.Rick, your assistant, wants to use features of Windows Aero. Which of the Following features doesWindows Aero provide?Each correct answer represents a complete solution. Choose all that apply.A. Windows FlipB. Flip 3DC. Windows DefenderD. Aero Glass


Options are :

  • C,D,A
  • A,B,D
  • A,C,D
  • B,C,D

Answer : A,B,D

What are the benefits of using Universal Serial Bus (USB) 2.0 over legacy communication portssuch as RS-232 and parallel ports?Each correct answer represents a complete solution. Choose all that apply.A. SecurityB. Easy configuration of hardware devicesC. SpeedD. Expansion


Options are :

  • B,A,D
  • B,C,D
  • A,B,C
  • C,D,A

Answer : B,C,D

CompTIA Cloud Essentials CLO-001 Certified Practice Exam Set 6

At what voltage does a USB host supply power to the USB bus?


Options are :

  • 5 volts
  • 15 volts
  • . 50 volts
  • . 3 volts

Answer : 5 volts

You work as a freelance IT Technician. You attend to a user's call and after examining hiscomputer, you find that some of the components are not working properly. Which of the followingcomponents do you think should not be repaired, as it is very risky and the cost of repairing ishigher than its actual price?


Options are :

  • . Mouse
  • RAM
  • . Hard disk drive
  • . Switch mode power supply (SMPS)

Answer : . Switch mode power supply (SMPS)

Which of the following interfaces on the motherboard use south bridge?Each correct answer represents a complete solution. Choose two.A. RAMB. PCI busC. USB portsD. Video card


Options are :

  • C,D
  • B,C
  • A,B
  • A,D

Answer : B,C

CT0-101 Convergence+ Certification Practice Exam Set 11

Which of the following actions should a computer technician perform to determine a computerproblem? Each correct answer represents a complete solution. Choose three.A. Verify whether or not the adapter cards are seated properly in the motherboard slots.B. Verify whether or not the computer's peripherals are turned on.C. Verify whether or not the power cord and other cables on the computer are pluggedIn properly.D. Verify whether or not the operating system's DLL files are corrupted


Options are :

  • C,D,A
  • B,C,D
  • A,B,C
  • D,A,B

Answer : A,B,C

Your company uses Windows XP for all desktops. You need to have a personal firewall on eachdesktop. You also need that firewall to be on by default without the user having to turn it on.What should you do?


Options are :

  • . Installservice pack 2 and place the firewall in the startup menu.
  • Install service pack 1 and place the firewall in the startup menu.
  • . Installservice pack 2.
  • . Install service pack 1

Answer : . Installservice pack 2.

In which of the following situations is low quality printouts acceptable?


Options are :

  • Printing speed is more important than printing quality.
  • Printing quality is more important than printing speed.
  • DLow quality paper is used
  • . A large number of images need to be printed.

Answer : Printing speed is more important than printing quality.

HT0-201 CEA- CompTIA DHTI+ Certification Practice Exam Set 4

Which of the following technologies can be used to encrypt the wireless networks?Each correct answer represents a complete solution. Choose two.A. WAPB. WEPC. KerberosD. WPA


Options are :

  • A,D
  • C,D
  • B,D
  • A,B

Answer : B,D

Which of the following statements about the G3 state of a computer are true?Each correct answer represents a complete solution. Choose two.

A. A computer can be disassembled in this state.

B. This state is also known as soft off.

C. It is a normal working state of a computer.

D. A complete power loss occurs in this state such as power cord unplugged from a computer


Options are :

  • A,B
  • B,D
  • A,D
  • B,C

Answer : A,D

Which of the following can occur in a high humidity environment?


Options are :

  • . General protection fault
  • A broadcast storm on the network. .
  • Hardware resource conflict
  • . Damage of electronic components resulting in short circuit.

Answer : . Damage of electronic components resulting in short circuit.

CompTIA Network+ 6 Certification Practice Exams - 2019 Set 8

Which of the following processors can be installed on a motherboard that has Socket 8?


Options are :

  • Pentium 4 .
  • . Pentium
  • Pentium Pro
  • . AMD K6

Answer : Pentium Pro

While installing a high capacity hard disk drive on an older machine, what will you have toupgrade?


Options are :

  • The motherboard .
  • RAM .
  • The hard disk controller
  • . The System's BIOS

Answer : . The System's BIOS

You handle technical support for a school. Files are frequently copied or moved from one folder toanother for various reasons. When an unencrypted file was copied to a new folder, it becameencrypted. What is the most likely reason?


Options are :

  • . It was moved to an encrypted folder
  • Someone intentionally encrypted the file.
  • It was copied to an encrypted folder.
  • . It was moved to a folder that contained encrypted files. .

Answer : It was copied to an encrypted folder.

CompTIA Network+ (N10-007) 6 Practice Exams and Simulations Set 10

Which of the following modes saves maximum battery power while maintaining the current state ofa computing session?


Options are :

  • Hibernate mode
  • . Safe mode
  • . Session mode .
  • Standby mode

Answer : Hibernate mode

You work as a technician for Dreams Unlimited Inc. A user complains that a laser printer is notprinting documents properly. You find that the printed paper has a series of black spots at regularintervals. Which of the following steps will you take to resolve the issue?


Options are :

  • Replace the faulty driver
  • . Clean the fuser roller. .
  • Clean the spilt toner. .
  • Replace the EP drum.

Answer : . Clean the fuser roller. .

You are selecting memory to put in to a laptop. Which of the following types of RAM chips wouldyou most likely select?


Options are :

  • 184 PIN
  • . 240 PIN
  • . 72 PIN .
  • 144 PIN

Answer : 144 PIN

220-802 CompTIA A+ Certification Practice Exam Set 12

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions