CompTIA Network+ (N10-007) : 6 Practice Exams - 2019 Set 3

What type of spare component has power supplied to it and is ready to take over if the original component fails?



Options are :

  • C. Warm spare
  • A. Cold spare
  • B. Network spare
  • D. Hot spare (Correct)

Answer : D. Hot spare

Which disaster recovery site provides the facility and ensures that the site has an up-to-date copy of the data needed to have a fully functional site?



Options are :

  • B. Warm site
  • A. Hot site (Correct)
  • D. Cold site
  • C. Blue site

Answer : A. Hot site

A user’s credentials are checked against a database of accounts that are allowed to access the network. This process is known as _________________________?



Options are :

  • D. Permissions
  • A. Authorization
  • B. Authentication (Correct)
  • C. Rights

Answer : B. Authentication

FC0-U41 CompTIA Strata IT Fundamentals Practice Exam Set 8

Which permission is needed to send a document to the printer in the Windows world?



Options are :

  • A. Print (Correct)
  • B. Manage documents
  • D. Modify
  • C. Full Control

Answer : A. Print

Which disaster recovery site provides only the facility, but no equipment or copy of the original data?



Options are :

  • C. Blue site
  • D. Cold site (Correct)
  • B. Warm site
  • A. Hot site

Answer : D. Cold site

Which of the following pieces of software provide a vulnerability scan of the network? (Select

all that apply.)



Options are :

  • C. Microsoft Baseline Security Analyzer (Correct)
  • B. Norton AntiVirus
  • E. Spybot
  • D. Microsoft AntiSpyware
  • A. Languard (Correct)

Answer : C. Microsoft Baseline Security Analyzer A. Languard

JK0-802 CompTIA A+ Certification Exam Set 1

What is a hot-fix?



Options are :

  • C. A critical update that should be applied to your system as soon as possible (Correct)
  • A. An update that is noncritical
  • B. A number of updates that are bundled and will bring your system up-to-date
  • D. All of the above

Answer : C. A critical update that should be applied to your system as soon as possible

You need to ensure that your server supports a new disk standard—what would you do?



Options are :

  • B. Go to the server manufacturer’s web site and see if there is a BIOS update for that server that will update the BIOS code to make the server aware of the new standard. (Correct)
  • A. Purchase a new server that supports the new standard.
  • C. Format the hard drives and then restore the data.
  • D. All of the above.

Answer : B. Go to the server manufacturer’s web site and see if there is a BIOS update for that server that will update the BIOS code to make the server aware of the new standard.

Which encryption scheme uses the same encryption key to decrypt the data as the one that encrypted the data?



Options are :

  • B. RSA standard
  • C. Symmetric (Correct)
  • D. Public-key algorithm
  • A. Asymmetric

Answer : C. Symmetric

SY0-401 CompTIA Security+ Certification Practice Exam Set 10

What kind of firewall provides a single computer with two physical network interfaces?



Options are :

  • C. A screening router
  • D. A screened subnet firewall
  • A. A dual-homed host firewall (Correct)
  • B. A screened-host firewall

Answer : A. A dual-homed host firewall

Which NTFS permission would you use to allow a user to delete a file?



Options are :

  • D. Full Control
  • B. Modify (Correct)
  • C. Read and Execute
  • A. Read

Answer : B. Modify

What technology uses certificate authorities to verify that a message has not been tampered with?



Options are :

  • B. Local Security Authority
  • A. RSA encryption
  • C. Digital signatures (Correct)
  • D. None of the above

Answer : C. Digital signatures

CompTIA Network+ 6 Certification Practice Exams - 2019 Set 16

Which of the following make up part of the physical structure documentation? (Select all that apply.)



Options are :

  • D. VLAN configuration
  • C. WAN links (Correct)
  • B. Active Directory OUs
  • A. Routers (Correct)

Answer : C. WAN links A. Routers

What tool in Windows is used to create RAID volumes?



Options are :

  • D. Control Panel
  • C. Active Directory Users and Computers
  • B. Registry
  • A. Disk Management (Correct)

Answer : A. Disk Management

Where should you make certain that you have stored a copy of your network backups?



Options are :

  • B. In your manager’s office
  • A. In a central cabinet in the server room
  • D. Offsite in a safe, trusted location (Correct)
  • C. On a different server for quick restores

Answer : D. Offsite in a safe, trusted location

JK0-017 CompTIA E2C Project+ Certification Practice Exam Set 11

Which type of firewall is used to provide security based on rules governing the network or transport layers?



Options are :

  • A. Packet level (Correct)
  • D. None of the above
  • B. Application level
  • C. Circuit level

Answer : A. Packet level

What type of attack involves the hacker altering the source address of a packet?



Options are :

  • C. Social engineering attack
  • D. Spoof attack (Correct)
  • B. Dictionary attack
  • A. Buffer overflow

Answer : D. Spoof attack

What encryption standard is based on a fixed 56-bit symmetric key encryption algorithm?



Options are :

  • B. DES (Correct)
  • C. CPA
  • A. RSA
  • D. DSE

Answer : B. DES

JK0-017 CompTIA E2C Project+ Certification Practice Exam Set 7

Where does Windows Server store IIS log files?



Options are :

  • B. C:\windows\system32\logfiles (Correct)
  • D. C:\windows\iislogs
  • C. C:\iislogs
  • A. C:\logs

Answer : B. C:\windows\system32\logfiles

What type of cable is used to connect the workstation to the network jack located in the wall?



Options are :

  • D. Thicknet
  • A. Crossover
  • C. Patch (Correct)
  • B. Thinnet

Answer : C. Patch

Which of the following will most likely create electromagnetic interference with your computer equipment?



Options are :

  • A. DVD player
  • C. TV
  • D. Dining room table
  • B. Generator (Correct)

Answer : B. Generator

SY0-401 CompTIA Security+ Certification Practice Exam Set 2

Which RAID level stores a full copy of the data on a second disk?



Options are :

  • A. RAID level 0
  • C. RAID level 5
  • B. RAID level 1 (Correct)
  • D. All of the above

Answer : B. RAID level 1

What type of backup backs up files that have changed and does not clear the archive bit?



Options are :

  • A. Full
  • C. Differential (Correct)
  • B. Incremental
  • D. Copy

Answer : C. Differential

A RAID level 1 solution that uses two hard disk controllers is called what?



Options are :

  • C. Redundancy
  • B. Striping
  • D. Duplexing (Correct)
  • A. Mirroring

Answer : D. Duplexing

CompTIA JK0-022 E2C Security+ Network Security Practice Exam Set 5

What is the name of malicious software that monitors Internet activity?



Options are :

  • A. Virus
  • C. Spyware (Correct)
  • D. Trojan
  • B. Worm

Answer : C. Spyware

How would you make sure that you do not forget to perform a backup each night?



Options are :

  • D. Set a reminder in Outlook.
  • A. Create a backup plan.
  • C. Ask your manager to remind you to do the backup each night.
  • B. Schedule the backup software to do the backup automatically. (Correct)

Answer : B. Schedule the backup software to do the backup automatically.

What portion of the Windows security subsystem handles both local security policies and user

authentication, and generates audit log messages?



Options are :

  • B. Security Accounts Manager (SAM)
  • A. Local Security Authority (LSA) (Correct)
  • C. Security Reference Monitor
  • D. None of the above

Answer : A. Local Security Authority (LSA)

JK0-802 CompTIA A+ Certification Exam Set 2

What is the name of the printer component that is the software interface to the print device?



Options are :

  • A. Print device
  • B. Printer (Correct)
  • D. Printout
  • C. Print server

Answer : B. Printer

Which block cipher mode encrypts each block individually during the encryption process?



Options are :

  • D. None of the above
  • A. Electronic Codebook (ECB) (Correct)
  • C. Cipher Feedback Mode (CFB)
  • B. Cipher Block Chaining (CBC)

Answer : A. Electronic Codebook (ECB)

Which of the following allows a user to modify the contents of a file?



Options are :

  • B. Read
  • D. Modify (Correct)
  • A. Read and Execute
  • C. List Folder Contents

Answer : D. Modify

SY0-401 CompTIA Security+ Certification Practice Exam Set 9

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions