FC0-U51 CompTIA IT Fundamentals Certification Exam Set 11

When connecting a printer to a network, which of the following is needed to complete the process? (Select TWO).
A. IP address
B. User's password
C. Computer's name
D. Subnet mask
E. HTTP port
F. Fax number


Options are :

  • A.B
  • A,D
  • A,E
  • B,C

Answer : A,D

Which of the following would BEST be described as password best practices? (Select THREE).
A. Use of long passwords
B. Sharing passwords with a trusted source
C. Limiting password reuse
D. Keeping default passwords
E. Use of special characters
F. Writing down difficult passwords


Options are :

  • A,C,E
  • C,D,E
  • A,E,F
  • A,B,C

Answer : A,C,E

Which of the following data connections would provide a user the BEST Internet availability while  traveling?


Options are :

  • Workstation with only RJ-45 connectors
  • Smartphone with cellular service
  • Laptop with Bluetooth wireless connectivity
  • Tablet connected to a SOHO wireless network

Answer : Smartphone with cellular service

SY0-401 CompTIA Security+ Certification Practice Exam Set 6

A technician wants to minimize the risk of having third parties track previously visited web pages. Which of the following should be performed in the Internet browser's settings? (Select TWO).


Options are :

  • C,D
  • A,E
  • A,B
  • B,C

Answer : C,D

When setting up a new workstation, which of the following should be configured during the initial OS setup wizard?


Options are :

  • Security software
  • Additional software
  • Date and time settings
  • Peripheral devices

Answer : Date and time settings

Where can a user find the latest updates, upgrades, or firmware for an electronic device that the vendor supports?


Options are :

  • Internet forum
  • Internet forum
  • OEM website
  • Internet search engine

Answer : Internet forum

JK0-019 CompTIA E2C Network + Certification Exam Set 4

A user needs to download tax documents from a financial website. Which of the following is the website MOST likely to use for transmission of the tax document to the user's browser?


Options are :

  • HTTPS
  • SFTP
  • HTTP
  • FTP

Answer : HTTPS

Which of the following BEST describes the pros and cons of a home wired network?


Options are :

  • High throughput, high mobility, low availability, low latency, high security
  • Low throughput, high mobility, low availability, high latency, low security
  • High throughput, low mobility, high availability, low latency, high security
  • Low throughput, low mobility, high availability, high latency, high security

Answer : High throughput, low mobility, high availability, low latency, high security

A user is configuring a SOHO wireless router. The user should change the router's default   administrator password for which of the following reasons?


Options are :

  • To prevent improper data transmission encryption
  • To prevent improper data transmission encryption
  • To increase wireless signal strength
  • To prevent social engineering attacks

Answer : To prevent improper data transmission encryption

BR0-002 CompTIA Network + Bridge Practice Exam Set 2

A user is setting up an older wireless access point that has only WEP for encryption. Which of the following additional steps will help to secure the network? (Select TWO). A. Disable SSID broadcast. B. Refresh the MAC address. C. Filter the MAC address. D. Refresh the IP address. E. Use CAT6 cables.


Options are :

  • A,B
  • C,D
  • A,C
  • A,E

Answer : A,C

When applying ergonomics to a workstation area, which of the following are the MOST important to consider? (Select TWO).
A. Proper sitting position
B. Amount of time computer will be used
C. Clarity of the display
D. Proper keyboard and mouse height
E. Number of speakers in sound system
F. Brightness and contrast of the display 


Options are :

  • A,E
  • A,D
  • B,C
  • A,B

Answer : A,D

Ann, a user, wishes to free space in her documents folder. Which of the following is the BEST characteristic to sort by in order to ensure that the most space is freed by deleting the least amount of files?


Options are :

  • Extension
  • File path
  • Date modified
  • Size

Answer : Size

FC0-U51 CompTIA IT Fundamentals Certification Exam Set 2

Which of the following security threats occurs when a user receives an email from an illegitimate source asking for login information?


Options are :

  • Phishing
  • Spam
  • Cracking
  • Hacking

Answer : Phishing

Multiple laptops that contain confidential data are stolen from a company. Which of the following is a likely policy change resulting from this incident?


Options are :

  • Requiring screensaver password
  • Enabling full disk encryption
  • Adding multifactor authentication
  • Disabling Bluetooth adapters

Answer : Enabling full disk encryption

Which of the following permissions is required to run a .bat file?


Options are :

  • Execute
  • Modify
  • Delete
  • Write

Answer : Execute

Questions & Answers : CompTIA Network+ (N10-007)

Which of the following connections provide data with the MOST secure protection from interception?


Options are :

  • WiFi
  • Wired
  • IR
  • Cellular

Answer : Wired

Which of the following protocols is used to secure communications between sender and receiver?


Options are :

  • SSL
  • SIP
  • SMTP
  • SNMP

Answer : SSL

Which of the following will allow the easiest and fastest way to share a single file between two modern smartphones without joining the same WiFi network?


Options are :

  • Bluetooth
  • Infrared
  • USB connection
  • Micro SD card

Answer : Bluetooth

CAS-003 CompTIA Advanced Security Practitioner (CASP+) Exam Set 3

Malware that has an embedded keylogger to capture all of the keystrokes and steal logins is considered: 


Options are :

  • ransomware
  • spyware
  • adware
  • phishing

Answer : spyware

A user is browsing the Internet when suddenly a threatening message appears on screen demanding a payment in order to avoid the system being disabled. Which of the following BEST describes this type of malware infection?


Options are :

  • Spyware
  • Virus
  • Ransomware
  • Adware

Answer : Ransomware

Joe, a user, wishes to allow his roommate to access his personal computer for Internet browsing, but does not want his roommate to have the ability to make changes to the system. Which of the following BEST describes the type of account Joe should create for his roommate?


Options are :

  • Administrator
  • Standard
  • Guest
  • Power user

Answer : Guest

CAS-001 CompTIA Advanced Security Practitioner Practice Exam Set 1

A user receives an email formatted to appear as if the bank sent it. The email explains that the user must confirm the name, address, and social security number listed on the bank account. Which of the following BEST describes the security threat taking place?


Options are :

  • Shoulder surfing
  • Phishing
  • Social engineering
  • Spam

Answer : Phishing

A technician needs to troubleshoot a user's computer. The user leaves personal credentials written on a piece of paper for the technician. Which of the following principles has the user violated?


Options are :

  • Password complexity
  • Password confidentiality
  • Password expiration
  • Password reuse

Answer : Password confidentiality

SY0-401 CompTIA Security+ Certification Practice Exam Set 9

A technician is setting up a router and would like to increase the security level. Which of the following actions will achieve this?


Options are :

  • Increasing transmission power
  • Installing anti-malware on the router
  • Configuring multifactor logon authentication
  • Changing the default admin password

Answer : Changing the default admin password

An employee is using a desk phone that is connected only via a network cable. Which of the following technologies is the phone using?


Options are :

  • GSM
  • LTE
  • VoIP
  • CDMA

Answer : VoIP

A user is accessing an online bank account for the first time via an Internet browser. Which of the following should the user check? (Select TWO).
A. HTTPS before the URL
B. Exclamation point on the status bar
C. Lock symbol in the address bar
D.  HTTP before the URL
E. Skull/crossbones symbol in the corner 


Options are :

  • A,E
  • B,D
  • A,C
  • A,B

Answer : A,C

FC0-U51 CompTIA IT Fundamentals Certification Exam Set 7

Which of the following application types is MOST often used for doing a mail merge?


Options are :

  • Word processor
  • Personal information manager
  • Presentation software
  • PDF software

Answer : Word processor

Which of the following describes the difference between open source and commercial operating systems?


Options are :

  • Open source operating systems run on standard and non-standard hardware, whereas commercial operating systems only run on specific hardware.
  • Open source operating systems are usually provided free of charge, whereas most commercial operating systems are usually provided at some cost
  • Open source operating systems only run on desktop computers, whereas commercial operating systems run on servers.
  • Open source operating systems can be downloaded and used by everyone, whereas commercial operating systems can only be used by companies.

Answer : Open source operating systems are usually provided free of charge, whereas most commercial operating systems are usually provided at some cost

Which of the following computer connector types was designed specifically for allowing high-speed external hard drive transfers?


Options are :

  • DVI
  • HDMI
  • USB
  • eSATA

Answer : eSATA

CompTIA 220-801 A+ Advanced Certification Practice Exam Set 8

Which of the following are examples of video connectors? (Select TWO).
A. VGA
B. Serial
C. HDMI
D. eSATA
E. PS/2


Options are :

  • B,C
  • C,D
  • A,C
  • A,B

Answer : A,C

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions