JK0-802 CompTIA A+ Certification Exam Set 12

A user is experiencing slow performance with their computer. A technician suspects the computer has a virus and runs antivirus software. A virus is found and removed, but the performance issue is not resolved. Which of the following should the technician perform NEXT?


Options are :

  • Establish a plan of action to resolve the problem
  • Implement preventative measures
  • Document findings, actions, and outcomes
  • Re-establish a new theory or escalate (Correct)

Answer : Re-establish a new theory or escalate

SY0-401 CompTIA Security+ Certification Practice Exam Set 6

A user has a perimeter firewall and up-to-date antivirus software. The user is asking what else they can do to improve their security. Which of the following will have the MOST impact on network security? (Select TWO).A. Install additional antivirus softwareB. Disable screen saversC. Conduct a daily security auditD. Assign security rights based on job rolesE. Use strong passwords


Options are :

  • B,E
  • C,D
  • D,E (Correct)
  • A,B

Answer : D,E

A user receives a phone call from a person claiming to be from technical support. This person knows the user’s name and that the user has Windows installed on their computer. The technician directs the user to open Event Viewer and look at some event log entries to demonstrate the effects of a virus on the computer. The technician also asks the user for their user ID and password so that they can clean the computer. This is an example of which of the following security threats?


Options are :

  • Social engineering (Correct)
  • Virus
  • Malware
  • Phishing

Answer : Social engineering

Turnstiles and other mantraps will prevent which of the following security threats?


Options are :

  • Rootkits
  • Viruses
  • Tailgating (Correct)
  • Shoulder surfing

Answer : Tailgating

JK0-802 CompTIA A+ Certification Exam Set 8

Which of the following passwords is the MOST secure according to industry best practices?


Options are :

  • thisisthecorrectanswer1
  • SimpleAnswer1234
  • VeryStrongPassword
  • E@sy2Remember (Correct)

Answer : E@sy2Remember

Which of the following security measures is usually found in a laptop?


Options are :

  • Biometrics (Correct)
  • Hypervisor
  • Key fobs
  • Bollard

Answer : Biometrics

Which of the following scenarios BEST defines phishing?


Options are :

  • A user receives an email from a person in another country with a story as to why they need help with a financial arrangement. (Correct)
  • A user receives a pop-up message about a virus from a company that states that if they buy this product it will remove the virus.
  • A user receives a message about unwanted activity from their antivirus asking to remove the suspect file.
  • A user receives an email from a friend to download a picture but the file format ends in .exe.

Answer : A user receives an email from a person in another country with a story as to why they need help with a financial arrangement.

CompTIA JK0-015 E2C Security+ Certification Practice Test Set 3

Which of the following is considered a method of physical security?


Options are :

  • Strong passwords
  • NTFS
  • Cipher locked doors (Correct)
  • Firewall

Answer : Cipher locked doors

When securing a new wireless router, which of the following should be changed FIRST?


Options are :

  • Radio power levels
  • Default SSID
  • Default password (Correct)
  • DHCP settings

Answer : Default password

Which of the following security controls would be an example of the least privilege principle on a home PC?


Options are :

  • Create a standard user account for kids. (Correct)
  • Disable the firewall for online gaming.
  • Install antispyware on the PC
  • Store all financial data in a separate folder.

Answer : Create a standard user account for kids.

CompTIA Network+ N10 006 Set 2

In order to prevent other users from editing files in ‘C:\ Files’, which of the following steps should be taken?


Options are :

  • Set the folder to index files for search
  • Set the local administrator as the owner of the folder
  • Set NTFS permissions to read only (Correct)
  • Set network share permissions to read only

Answer : Set NTFS permissions to read only

A technician has configured the ability to connect to a small office server using remote desktop from a workstation within the office. The technician has reviewed logs that show constant brute force attacks to that server from outside the network. Which of the following would prevent this from occurring?


Options are :

  • Logically move the server to the DMZ
  • Configure the server to use a static IP
  • Disable the remote desktop port (Correct)
  • Reallocate the server to a different networking closet

Answer : Disable the remote desktop port

A technician is trying to setup a non-domain user account on a workstation, but receives the following error message “Password does not meet the complexity requirements.” Which of the following utilities should the technician use to identify the criteria?


Options are :

  • Users and Groups
  • Performance Monitor
  • MSCONFIG
  • Local Security Policy (Correct)

Answer : Local Security Policy

JK0-015 CompTIA E2C Security+ 2008 Edition Practice Exam Set 13

A technician recently setup a new wired network and wants to ensure only their computers can use it. Which of the following is the MOST secure way to accomplish this?


Options are :

  • Enable an intrusion detection system
  • Assign the computers static IP addresses
  • Make sure the computers are using strong passwords
  • Disable the extra ports on the router (Correct)

Answer : Disable the extra ports on the router

Which of the following would be the BEST way to combat social engineering?


Options are :

  • User education (Correct)
  • Strong password usage
  • Badges
  • Deny social networks through the firewall

Answer : User education

An unauthorized user observing system security procedures is known as:


Options are :

  • Shoulder surfing (Correct)
  • Spyware.
  • Phishing.
  • A worm.

Answer : Shoulder surfing

CompTIA Network+ 6 Certification Practice Exams - 2019 Set 3

Which of the following are examples of physical security? (Select TWO).A. BadgesB. Anti-virusC. EncryptionD. FirewallsE. Locked doors


Options are :

  • C,D
  • A,B
  • A,E (Correct)
  • D,E

Answer : A,E

Which of the following can be achieved with Group Policy to help with workstation security measures?


Options are :

  • BitLocker password
  • Complexity requirements (Correct)
  • Wake on LAN
  • BIOS password

Answer : Complexity requirements

A user regularly has to walk away from their computer and is worried someone may access their workstation. Which of the following would BEST prevent this?


Options are :

  • Set the screensaver password
  • Logon using the unprivileged guest account
  • Lock the workstation (Correct)
  • Shutdown the computer

Answer : Lock the workstation

JK0-802 CompTIA A+ Certification Exam Set 7

A technician enabled remote management on the small office WAP to manage this device from another location. Users are reporting that the WAP has changed its SSID without anyone’s knowledge. Which of the following would prevent this from occurring?


Options are :

  • Enable static IP addresses
  • Disable the SSID from broadcasting
  • Change to user MAC filtering
  • Change default usernames and passwords (Correct)

Answer : Change default usernames and passwords

Which of the following user accounts should be renamed to adhere to security best practices?


Options are :

  • Power user
  • Administrator (Correct)
  • Standard user
  • Guest

Answer : Administrator

Phishing is:


Options are :

  • An infection that causes a web browser to go to a different site than the one intended from a search result page.
  • A technique used to obtain financial information from a user mimicking a legitimate website. (Correct)
  • A technique used to obtain financial information from a user by compiling information from social networks and their friends.
  • An infection that causes a computer to behave erratically by playing music and launching browser windows.

Answer : A technique used to obtain financial information from a user mimicking a legitimate website.

CompTIA Advanced Security Practitioner(CASP+) Practice Exams Set 1

Privacy filters applied to users computer screens are used to combat which of the following security risks?


Options are :

  • Shoulder surfing (Correct)
  • Spear phishing
  • Social Engineering
  • Rootkits

Answer : Shoulder surfing

Which of the following user accounts should be disabled to adhere to security best practices?


Options are :

  • Guest (Correct)
  • Standard user
  • Power user
  • Administrator

Answer : Guest

A user reports that every time they use a search engine and click on a link to go to a website, they instead are taken to a site blocked by their company’s content filter. The user is not trying to go to the blocked site and needs to be able to successfully use the search engine to complete their assignment. Which of the following tools would a technician use to BEST resolve this issue?


Options are :

  • System restore
  • Factory pre-installation
  • Recovery console
  • Anti-malware software (Correct)

Answer : Anti-malware software

JK0-017 CompTIA E2C Project+ Certification Practice Exam Set 10

For any given 802.11n wireless Internet signal, which of the following is needed to establish a connection?


Options are :

  • Proper SSID (Correct)
  • SSL certificate
  • Windows password
  • MAC address filtering

Answer : Proper SSID

Which of the following should a technician do LAST after cleaning up a virus infection?


Options are :

  • Schedule scans and updates
  • Update antivirus software
  • Enable system restore and create restore point
  • Educate the end user (Correct)

Answer : Educate the end user

Which of the following security threats is BEST mitigated through proper user training?


Options are :

  • A Worm
  • Rootkits
  • Browser Adware
  • Social Engineering (Correct)

Answer : Social Engineering

CV0-001 CompTIA Cloud+ Certification Practice Exam Set 7

A technician has installed the hardware for a SOHO wired network. Which of the following is the FIRST step to securing the network?


Options are :

  • Disable unused ports
  • Enable MAC filtering
  • Change default usernames and passwords (Correct)
  • Assign static IP addresses

Answer : Change default usernames and passwords

Which of the following features helps to prevent shoulder surfing?


Options are :

  • Privacy screen (Correct)
  • Auto adjust
  • Degaussing
  • Native resolution

Answer : Privacy screen

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions