CompTIA IT Fundamentals (Exam FC0-U61) Practice Tests Set 2

Which of the following items require ESD precautions?


Options are :

  • Upgrading to a new touch screen monitor
  • Adding a micro SD card to a smartphone
  • Installing an compact flash card into a laptop
  • Replacing RAM in a personal computer

Answer :Replacing RAM in a personal computer

CT0-101 Convergence+ Certification Practice Exam Set 2

Which of the following are reasons to verify backups? (Select TWO).


Options are :

  • To create a system image for easy restore
  • To confirm all selected data was backed up
  • To diagnose any backup media hardware failure
  • To determine if backup software needs to be patched
  • To ensure files can be restored

Answer :To confirm all selected data was backed up To ensure files can be restored

A user has just removed a new desktop PC from the box and has plugged in several new peripheral devices. During which of the following steps will the plug and play peripheral devices be installed on the new PC?


Options are :

  • Installing security software
  • Powering on for the first time
  • Booting the operating system
  • Adding additional user accounts

Answer :Booting the operating system

Which of the following is the BEST method of sharing files within a department?


Options are :

  • Email
  • Flash drive
  • Network drive
  • Instant messaging
  • NFC

Answer :Network drive

CompTIA JK0-018 Security+ E2C Certified Practice Exam Set 9

When storing a document in the cloud, a user needs to be:


Options are :

  • On a shared drive.
  • Using a USB cable.
  • Connected to the Internet.
  • In airplane mode.

Answer :Connected to the Internet.

A technician wants to keep a router up to date. Which of the following MUST be updated regularly?


Options are :

  • SSID
  • Administrator password
  • Wireless encryption
  • Firmware

Answer :Firmware

The extension .rtf is an example of which of the following file types?


Options are :

  • Document
  • Executable
  • Audio
  • Speadsheet

Answer :Document

Practice : CompTIA Cloud+ Certification

Which of the following are examples of video connectors? (Select TWO).


Options are :

  • VGA
  • Serial
  • HDMI
  • eSATA
  • PS/2

Answer :VGA HDMI

When setting up a new computer, where does a user change the date and time?


Options are :

  • Peripheral configuration
  • Localization settings
  • Screen resolution
  • eSATA settings

Answer :Localization settings

A user wants to have the latest security patches and bug fixes installed on a computer. Which of the following is the BEST method to achieve this?


Options are :

  • Configure anti-malware updates
  • Manually update before each use
  • Update every six months
  • Schedule automatic updates

Answer :Schedule automatic updates

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 3

Which of the following are basic functions to use when working only with files and folders in an OS? (Select two.)


Options are :

  • Maximize
  • Run
  • Copy
  • Exit
  • Minimize
  • Rename

Answer :Copy Rename

A user is attempting to open a file and receives a pop-up message stating that the action cannot be accomplished. This is MOST likely a result of which of the following?


Options are :

  • The user is not logged into the system properly.
  • The file is a read-only file.
  • The user is not granted permission to access the file.
  • The file attribute is set to hidden.

Answer :The user is not granted permission to access the file.

A company needs an application that filters unwanted network traffic. Which of the following should be configured?


Options are :

  • Secure sockets layer
  • Software firewall
  • 128-bit encryption
  • Span filter

Answer :Software firewall

JK0-017 CompTIA E2C Project+ Certification Practice Exam Set 4

An employee who is working for a small business would like to prevent shoulder surfing. Which of the following should the employee do?


Options are :

  • Lock the computer.
  • Purchase a privacy screen.
  • Enable encryption.
  • Create a strong password.

Answer :Purchase a privacy screen.

When logging in to a laptop, which of the following is an example of multifactor authentication?


Options are :

  • Logging on via key fob, password, and fingerprint reader
  • Entering an account number, PIN, and password to log in
  • A technician using the fingerprint reader and a retina scan
  • A user entering a strong password to log in

Answer :Logging on via key fob, password, and fingerprint reader

Which of the following allows wireless devices to communicate to a wired network?


Options are :

  • Modem
  • Switch
  • Firewall
  • Access point

Answer :Access point

LX0-104 CompTIA Linux+ [Powered by LPI] Exam Set 6

Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?


Options are :

  • Laptop
  • Workstation
  • Mobile phone
  • Server

Answer :Server

Which of the following BEST describes an application running on a typical operating system?


Options are :

  • Process
  • Thread
  • Function
  • Task

Answer :Process

The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?


Options are :

  • Update from 802.11b to 802.11g.
  • Ensure sources of EMI are removed.
  • Enable WPA2-Enterprise.
  • Use WiFi Protected Setup.

Answer :Ensure sources of EMI are removed.

JK0-017 CompTIA E2C Project+ Certification Practice Exam Set 12

A traveling business user is utilizing an LTE cellular connection that provides good coverage but experiences numerous outages during a given week. This would be

classified as which of the following?


Options are :

  • High mobility and low reliability
  • High mobility and high latency
  • High availability and low mobility
  • High availability and low throughput

Answer :High mobility and low reliability

Joe, a user, has installed a new SOHO wireless router. The router keeps dropping PC connections. Which of the following should be check?


Options are :

  • SSID
  • MAC address
  • Firmware
  • Password

Answer :Firmware

Which of the following are MOST likely to be configured during the initial setup of an OS on a basic workstation? (Select two.)


Options are :

  • Antivirus settings
  • License keys
  • Email setup
  • Localization settings
  • Printer configuration

Answer :License keys Localization settings

CompTIA JK0-017 E2C Project+ Certification Practice Exam Set 10

A technician wants to test a new OS version locally without interfering with a production installation. Which of the following is the BEST technology to use?


Options are :

  • Cloud application software
  • Virtualization software
  • Telepresence software
  • Collaboration software

Answer :Virtualization software

Which of the following connection methods requires line-of-sight to be effective?


Options are :

  • Fiber optics
  • Infrared
  • Cellular
  • Wi-Fi

Answer :Infrared

Which of the following is a type of printing technology commonly used today?


Options are :

  • Infrared
  • eSATA
  • Laser
  • Flatbed

Answer :Laser

FC0-U41 CompTIA Strata IT Fundamentals Practice Exam Set 3

Which of the following are examples of mobile OSs for cellular services? (Select two.)


Options are :

  • iOS
  • Mac OS
  • Chrome OS
  • Android
  • Windows XP

Answer :iOS Android

To ensure that a user is hardening computer resources properly, the user should do which of the following? (Select two.)


Options are :

  • Use one account for all family members.
  • Look for open wireless network.
  • Recognize suspicious hyperlinks.
  • Install and update threat prevention software.
  • Use a password-protected screen saver.
  • Disable system timeouts.

Answer :Install and update threat prevention software. Use a password-protected screen saver.

Which of the following is true about a user wanting to run a 64-bit software program on a 32-bit OS?


Options are :

  • The program cannot run natively on a 32-bit OS.
  • The program will run with reduced functionality.
  • The program can only run in compatibility mode.
  • The program can run only if the computer hardware supports 64-bit.

Answer :The program cannot run natively on a 32-bit OS.

CAS-003 CompTIA Advanced Security Practitioner (CASP+) Exam Set 5

Which of the following is used by an email account to receive email?


Options are :

  • DNS
  • SMTP
  • SFTP
  • SNMP
  • POP3

Answer :POP3

Which of the following allows for an audio and video signal to be sent via a single cable?


Options are :

  • HDMI
  • VGA
  • RGB
  • SATA

Answer :HDMI

Which of the following allows users to print to another user's local printer?


Options are :

  • Network printing
  • Bluetooth printing
  • Print sharing
  • Peer-to-peer sharing

Answer :Print sharing

CompTIA Security+ SY0-501 Exam Preparation (Latest Version) Set 3

A user has a username and password to log onto a banking website. The user would like to keep access to the account as secure as possible. Which of the following security best practices should the user follow? (Select TWO).


Options are :

  • Use only public computers to access the website
  • Create a complex password
  • Change the default password
  • Write the password down
  • Use the original password

Answer :Create a complex password Change the default password

HT0-201 CEA- CompTIA DHTI+ Certification Practice Exam Set 2

A user, Ann, is experiencing slow browsing on a website she frequently visits that displays constant pop-up ads. Which of the following is the MOST likely cause?


Options are :

  • The browser is incompatible with the website
  • The workstation has been infected with malware
  • The website is not secured by SSL
  • The certificate of the website has expired

Answer :The workstation has been infected with malware

A laptop owner, Ann, can no longer see web pages when she opens her browser, and she can only see her search bars and plug-ins. Which of the following is the MOST likely source of this issue?


Options are :

  • The computer does not have current antivirus software installed
  • The computer needs to have its components upgraded
  • The downloaded toolbars are filling the browser screen
  • The owner was not using complex passwords

Answer :The downloaded toolbars are filling the browser screen

Which of the following is the MOST sensitive Personally Identifiable Information (PII) and should be shared cautiously and only with trusted resources?


Options are :

  • Email address
  • Phone number
  • Mother's maiden name
  • Last name

Answer :Mother's maiden name

CompTIA JK0-801 A+ Networking & PC Hardware Practice Exam Set 13

A user will be traveling with a smartphone that contains confidential information. Which of the following should be disabled? (Select TWO).


Options are :

  • Keyboard
  • Speakers
  • Mouse
  • Bluetooth
  • NFC

Answer :Bluetooth NFC

A technician wants to minimize the risk of having third parties track previously visited web pages. Which of the following should be performed in the Internet browser's settings? (Select TWO).


Options are :

  • Select form data
  • Disable location services
  • Remove cookies
  • Clear history
  • Change passwords

Answer :Remove cookies Clear history

When setting up a new device, there are multiple features available that will never be used. Which of the following should the user do to make the new device more secure?


Options are :

  • Make all users administrators.
  • Remove or disable the unnecessary features.
  • Install a password manager on the device.
  • Make all users guests.

Answer :Remove or disable the unnecessary features.

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 6

Joe, a user, saves a document to a flash drive on his computer in order to print the document from a public computer kiosk. After returning home and reinserting the flash drive in his computer, the security software identifies an infected file on the flash drive. Which of the following is the MOST likely cause of the infection?


Options are :

  • The flash drive was infected by a war driving hacker on the way to the public kiosk.
  • The public workstation was infected by Joe's flash drive.
  • The public workstation was infected and passed the virus to the flash drive.
  • The flash drive was already infected by the user's computer.

Answer :The public workstation was infected and passed the virus to the flash drive.

A user is browsing the Internet when suddenly a threatening message appears on screen demanding a payment in order to avoid the system being disabled. Which of the following BEST describes this type of malware infection?


Options are :

  • Ransomware
  • Adware
  • Spyware
  • Virus

Answer :Ransomware

Which of the following is an example of ransomware?


Options are :

  • A user is asked to pay a fee for a password to unlock access to their files.
  • A user receives an email demanding payment for a trial application that has stopped working.
  • A user has opened an Internet browser and is taken to a site that is not the normal home page.
  • A user is asked to open an attachment that verifies the price of an item that was not ordered.

Answer :A user is asked to pay a fee for a password to unlock access to their files.

220-701 A+ Essentials Certification Practice Exam Set 1

An employee, Joe, forgot his laptop at the airport. Joe is worried about unauthorized access. Which of the following BEST protects against data theft in this instance?


Options are :

  • Security software
  • Full disk encryption
  • Cable lock
  • Username and password
  • Patching the OS and third party software

Answer :Full disk encryption

Multiple laptops that contain confidential data are stolen from a company. Which of the following is a likely policy change resulting from this incident?


Options are :

  • Enabling full disk encryption
  • Requiring screensaver password
  • Disabling Bluetooth adapters
  • Adding multifactor authentication

Answer :Enabling full disk encryption

A user receives an email formatted to appear as if the bank sent it. The email explains that the user must confirm the name, address, and social security number listed on the bank account.

Which of the following BEST describes the security threat taking place?


Options are :

  • Shoulder surfing
  • Social engineering
  • Spam
  • Phishing

Answer :Phishing

CompTIA JK0-022 E2C Security+ Compliance & Operational Exam Set 2

A user, Ann, is concerned about theft of her laptop and does not want a thief to have easy access to all of her banking and email. Which of the following precautions could be taken to mitigate this issue?


Options are :

  • Only browse the Internet on WiFi connections that use WPA2
  • Turn off the guest account in the operating system
  • Disable autofill functionality within the web browser
  • Remove any legacy browsers from the computer

Answer :Disable autofill functionality within the web browser

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions