JK0-802 CompTIA A+ Certification Exam Set 3

Which of the following should a technician do FIRST to secure a mobile device?


Options are :

  • Install antivirus
  • Download updates
  • Disable GPS
  • Assign a passcode (Correct)

Answer : Assign a passcode

SK0-004 CompTIA Server+ Certification Practice Exam Set 9

Which of the following is the correct path to determine the IP address on an iOS device?


Options are :

  • Settings> General> Network> Wi-Fi> SSID Name> IP address (Correct)
  • General> Settings> Wi-Fi> SSID Name> Network> IP address
  • Wi-Fi> SSID Name> Network> IP address
  • Location Services> Settings> Wi-Fi> SSID Name> Network> IP address

Answer : Settings> General> Network> Wi-Fi> SSID Name> IP address

A technician is installing a webcam in a nursery for a user to monitor their baby. The user wants to ensure that the webcam is not broadcasting externally. Which of the following would the technician implement on the SOHO router to prevent the broadcast?


Options are :

  • Enable MAC filtering
  • Enable static IPs
  • Change the default SSID
  • Block the outbound port (Correct)

Answer : Block the outbound port

A user wants to quickly install the most recent security patch released. Which of the following options can be selected from the Windows Update website?


Options are :

  • Automatic settings
  • Express settings (Correct)
  • Custom settings
  • Advanced settings

Answer : Express settings

CompTIA JK0-022 Security Cryptography Certification Exam Set 1

Which of the following features allows for easier navigation of long lists on a tablet device? 


Options are :

  • Pinch-zoom
  • Multitouch
  • Scrollbars
  • Touch flow (Correct)

Answer : Touch flow

Which of the following mobile device sync methods is easiest for the end user but requires more configuration on the part of the technician? 


Options are :

  • Wireless sync (Correct)
  • Dock sync
  • Encrypted wired sync
  • Wired sync

Answer : Wireless sync

IT suspects that other people are frequently making changes to a computer when a user leaves their desk. Which of the following security policies can be implemented in order to prevent this situation?


Options are :

  • Auto-lock (Correct)
  • Change the default username
  • Password complexity
  • Disable the guest account

Answer : Auto-lock

CompTIA A+ Certification 220-901: Practice Tests | Questions and Answers

A user gets a warning from their ISP about illegally downloading copyrighted movies. The user insists that they did not download any movies and calls a technician to implement stronger small office home office (SOHO) security. Which of the following will allow only known workstations to connect to the SOHO router?


Options are :

  • Static IPs
  • WEP password
  • MAC filtering (Correct)
  • WPA password

Answer : MAC filtering

A user states they constantly get pop-ups on their workstations asking them to buy a product. Which of the following is this known as?


Options are :

  • Social engineering
  • Phishing
  • Malware (Correct)
  • Shoulder surfing

Answer : Malware

Which of the following data types can be synchronized to a mobile device by default? (Select TWO).A. Biometric informationB. PicturesC. ContactsD. CredentialsE. SMS


Options are :

  • A,B
  • C,D
  • D,E
  • B,C (Correct)

Answer : B,C

CompTIA CySA+ (CS0-001)

A user has a laptop that they need to get ready for an outdoor presentation. The user is concerned that the laptop will turn off the screen or go into standby before their presentation is complete. Which of the following Control Panel paths should the technician use in order to prevent this from occurring?


Options are :

  • Power Options -> Hibernate
  • Power Options -> Power Schemes (Correct)
  • System -> Advanced -> Performance
  • System -> Hardware

Answer : Power Options -> Power Schemes

Which of the following will allow a company to implement the MOST cost-efficient way to easily identify whether a user has secure access to particular areas of a building?


Options are :

  • Install retina scanners
  • Require badges (Correct)
  • Install firewalls
  • Require key fobs

Answer : Require badges

A user has not received any new emails on their smartphone in the last two days. The user is able to access the Internet without any problems. Which of the following should the user do FIRST?


Options are :

  • Update the operating system
  • Restart the smartphone (Correct)
  • Resynchronize the smart phone
  • Reconfigure the smartphone email account

Answer : Restart the smartphone

CV0-001 CompTIA Cloud+ Certification Practice Exam Set 7

A user has highly confidential information on an old hard drive. Which of the following methods would BEST ensure that the data can never be recovered?


Options are :

  • FORMAT /Q
  • Overwrite program
  • Low level format
  • Degaussing tool (Correct)

Answer : Degaussing tool

Which of the following is the MOST secure method, short of physical destruction, that would be used to ensure that data on a hard drive cannot be recovered?


Options are :

  • Use a degaussing tool
  • Use an overwrite program (Correct)
  • Repartition the drive
  • Format the drive

Answer : Use an overwrite program

A user is concerned about an issue with iOS. The user MOST likely has which of the following devices?


Options are :

  • iCloud
  • Windows Tablet
  • iPhone (Correct)
  • Android Phone

Answer : iPhone

JK0-015 CompTIA E2C Security+ 2008 Edition Practice Exam Set 3

A user calls the help desk to report about their smartphone not being able to make any phone calls. The user admits that the smartphone can still send/receive email, browse all websites, and utilize all Internet-capable applications. Which of the following issues is MOST likely affecting the smartphone? 


Options are :

  • Wi-Fi is turned off; the cellular antenna is turned on.
  • The user forgot to turn off Bluetooth before trying to make a call.
  • The user has 4G capability turned off, and is only on 2G.
  • The cellular antenna is turned off; Wi-Fi is still on. (Correct)

Answer : The cellular antenna is turned off; Wi-Fi is still on.

A user realizes they left their mobile phone in a taxi minutes after the car departs. Which of the following should be done to BEST ensure none of the private data on the phone is accessed?   


Options are :

  • Remote Backup
  • GPS Tracking
  • Remote Wipe (Correct)
  • Passcode Lock

Answer : Remote Wipe

A customer reports that their wireless laptop cannot connect after removing it from its carrying case. The laptop boots and the user is able to log in. Which of the following should be checked FIRST?


Options are :

  • Laptop battery levels
  • External antenna switch (Correct)
  • Available hard drive space
  • Status in Device Manager

Answer : External antenna switch

JK0-015 CompTIA E2C Security+ 2008 Edition Practice Exam Set 6

Which of the following are characteristics of a strong password? (Select TWO).A. Hard to guess.B. Cannot be reversed.C. Uses dictionary words.D. Uses special characters.E. Can be encrypted.


Options are :

  • A,B
  • C,D
  • D,E
  • A,D (Correct)

Answer : A,D

Which of the following types of physical security features a passcode generated from an algorithm?


Options are :

  • Key Fob
  • RSA Token (Correct)
  • RFID Badge
  • Biometrics

Answer : RSA Token

Cellular antenna catches and transmits cellular signals and data. Wi-Fi is another technology that is used to access internet using a wireless router. So if the cellular antenna is turned off, you can still use Wi-Fi to browse internet and use host of applications.   Laptops and tablets have which of the following in common? 


Options are :

  • Contain an accelerometer
  • Not upgradable
  • Solid state drives (Correct)
  • No field serviceable parts

Answer : Solid state drives

JK0-015 CompTIA E2C Security+ 2008 Edition Practice Exam Set 2

Which of the following BEST describes the security term known as tailgating?


Options are :

  • Following behind someone when entering a secure area (Correct)
  • Removing files from a site using a hidden USB drive
  • Propping open a secure entrance to gain later access
  • Using someone elses logged in computer to access files

Answer : Following behind someone when entering a secure area

A user installed a new SOHO router and new wireless NICs to increase their transmission speed from 802.11b to 802.11g with the manufacturer's default settings. The user lives in an apartment building and is still experiencing slowness to the Internet after the installations. Which of the following is the MOST secure option that a technician could implement to resolve this issue?


Options are :

  • Assign static IP addresses
  • Disable the WAN port
  • Hide the SSID
  • Enable MAC filtering (Correct)

Answer : Enable MAC filtering

Which of the following is a device intended to prevent physical access to a facility?


Options are :

  • Tailgate
  • Firewall
  • Mantrap (Correct)
  • Bollards

Answer : Mantrap

CompTIA Network+ 6 Certification Practice Exams - 2019 Set 12

Which of the following OS based features limits access to a workstation? (Select TWO).A. User permissionsB. Strong passwordsC. Employee badgesD. Privacy filtersE. MAC filtering


Options are :

  • C,D
  • D,E
  • A,B (Correct)
  • A,D

Answer : A,B

To which of the following security methods does "User authentication/strong passwords" belong?


Options are :

  • Digital security (Correct)
  • Principle of least privilege
  • Physical security
  • User education

Answer : Digital security

A customer wants to setup a SOHO wired network. The customer needs assistance in setting up a static IP address on three computers on the network. Which of the following is the BEST solution for the technician to implement?


Options are :

  • Internet Options > Advanced tab > LAN settings, type in the IP address
  • Local Area Connections >Properties > TCP/IP > Properties > General > Specify, type in the IP address (Correct)
  • Internet Options >Connection > Network > LAN settings > choose Proxy server, type in the IP address
  • Windows Firewall > the Connections tab > Add Exception > Change Scope, type in the IP address

Answer : Local Area Connections >Properties > TCP/IP > Properties > General > Specify, type in the IP address

CompTIA N10-004 Network+ Certification Practice Test Set 9

A user is concerned about an issue with iOS. The user MOST likely has which of the following devices? 


Options are :

  • Android Phone
  • iCloud
  • iPhone (Correct)
  • Windows Tablet

Answer : iPhone

A client reports that their VoIP phone screen displays duplicate IP address. Which of the following is the FIRST action to try to resolve this problem? 


Options are :

  • Try another LAN connection
  • Change MAC address settings
  • Call the vendor
  • Reboot the phone (Correct)

Answer : Reboot the phone

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions