JK0-802 CompTIA A+ Certification Exam Set 4

After performing a wireless survey, a technician reports the following data:WAP Name ChannelWAP1 6WAP2 8WAP3 9Which of the following channels should the technician use for the SOHO WAP to be installed next?


Options are :

  • 11
  • 1 (Correct)
  • 3
  • 7

Answer : 1

N10-006 CompTIA Network+ Certification Practice Test Set 6

A user wants to prevent access to specific websites to prevent their children from accidently accessing them. Which of the following can be implemented?


Options are :

  • A switch
  • A firewall (Correct)
  • Antivirus software
  • Antispyware software

Answer : A firewall

After gaining administrative access, a malicious intruder might leave which of the following behind on a compromised system to allow for continued monitoring and access?


Options are :

  • Rootkit (Correct)
  • Trojan horse
  • Spyware
  • Logic bomb

Answer : Rootkit

A user is reporting that they are clicking on search results and being redirected to the wrong sites.Which of the following should a technician check FIRST?


Options are :

  • Cookies
  • Temporary Internet Files
  • Windows Firewall
  • Proxy Settings (Correct)

Answer : Proxy Settings

SY0-401 CompTIA Security+ Certification Practice Exam Set 3

A company has replaced all computers in their accounting department. Due to the sensitive nature of the department, company management has decided to remove and destroy all hard drives prior to donating the computers to a local charity. Now that the drives are removed, which of the following is the MOST efficient method of destroying the hard drives to prevent sensitive information from being leaked?


Options are :

  • Formatting
  • Overwriting
  • Degaussing (Correct)
  • Drive wiping

Answer : Degaussing

A SOHO network with nine workstations all connected to a switch is located in a room that visitors can enter. A technician wants to make the network secure from visitors. Which of the following would be the BEST solution?


Options are :

  • Disable all unused ports on the switch (Correct)
  • Enable QoS settings
  • Create strong network usernames and passwords
  • Ask administration to label the room off limits to visitors

Answer : Disable all unused ports on the switch

Which of the following security threats are typically designed to get the user to make a purchase? (Select TWO).A. WormB. VirusC. AdwareD. SpamE. TrojanF. Phishing


Options are :

  • E,F
  • D,E
  • C,D (Correct)
  • A,B

Answer : C,D

CompTIA JK0-801 A+ Certification Practical Exam Set 6

By disabling DHCP and allowing only static IP address assignments, which of the following will occur? (Select TWO).A. The domain controller will require additional RAMB. Devices without static IP addresses cannot connect to the networkC. IP address assignments will be consistent over timeD. Crosstalk will be reduced on the networkE. Network traffic and congestion will increase over timeF. A gateway will be required for every Ethernet port


Options are :

  • B,C (Correct)
  • C,D
  • A,B
  • E,F

Answer : B,C

Which of the following is typically the MOST difficult security threat to remove?


Options are :

  • Trojan
  • Spyware
  • Virus
  • Rootkit (Correct)

Answer : Rootkit

A technician is tasked with implementing the principle of least privilege to secure a file server so that only authorized users can modify company documents. Which of the following should the technician implement to comply with the request?


Options are :

  • Create a shared folder and only provide read access to all users regardless of their role.
  • Create a shared folder and grant full administrative rights only to the users who need to modify company documents.
  • Create a folder hierarchy, disable inheritance and assign user's permissions to specific folders. (Correct)
  • Create a folder tree hierarchy, enable inheritance and assign user's permissions to specific folders.

Answer : Create a folder hierarchy, disable inheritance and assign user's permissions to specific folders.

FC0-U41 CompTIA Strata IT Fundamentals Practice Exam Set 1

Joe, a technician, is asked to set up a wired kiosk laptop for office visitors to use for Internet access only. Which of the following would be MOST important in securing this type of setup?


Options are :

  • Disabling the administrator account
  • Restricting user permissions for the kiosk account (Correct)
  • Requiring personal information be entered before use
  • Changing the default usernames for all kiosk accounts

Answer : Restricting user permissions for the kiosk account

Which of the following software types would need to be installed on a mobile device to help prevent data from being viewed if the device is lost?


Options are :

  • Remote backup application
  • Antivirus
  • Remote wipe (Correct)
  • GPS locator

Answer : Remote wipe

Which of the following mobile device features disables cellular and wireless communication?


Options are :

  • Pairing Mode
  • Settings Reset
  • Airplane Mode (Correct)
  • Hotspot Mode

Answer : Airplane Mode

Comptia Linux+ LX0-103 Certification Exam Practice Test Set 2

Which of the following provides protection against DDoS attacks?


Options are :

  • UAC
  • RFID badge
  • Firewall (Correct)
  • Antivirus

Answer : Firewall

Which of the following allows a hidden backdoor to be used for access to workstations on the Internet?


Options are :

  • Firmware
  • Rootkits (Correct)
  • SQL injection
  • Cross-side scripting

Answer : Rootkits

While configuring a new email application that uses POP3 for a customer, the technician determines the firewall is blocking the traffic. Which of the following ports should be opened to allow POP3 mail traffic through the firewall?


Options are :

  • 110 (Correct)
  • 443
  • 3389
  • 53

Answer : 110

JK0-802 CompTIA A+ Certification Exam Set 9

A home user has forgotten their password and cannot log into their Windows XP Home PC. They do not want to lose any information. Which of the following should be used FIRST, assuming that the user had set up the PC?


Options are :

  • Log in as administrator from start up screen
  • Use third party software to change password
  • Restart in safe mode and log in as administrator (Correct)
  • Re-install the OS from the resource CD

Answer : Restart in safe mode and log in as administrator

A technician sends an email to an employee in the finance office telling them they need to change their password right away. The technician then walks into the employee's office to observe as the password is being changed. Later, the employee in the finance office reports that their password was compromised. Which of the following is the MOST likely cause?


Options are :

  • Phishing
  • SPAM
  • Malware
  • Shoulder surfing (Correct)

Answer : Shoulder surfing

A client has asked a technician about drive sanitation and wants to know what the difference is between overwriting a drive and formatting a drive. Which of the following would be the BEST response from the technician?


Options are :

  • “Overwriting writes 1s and 0s to a hard drive replacing the data, while formatting only clears the reference to the data and only overwrites as space is used.” (Correct)
  • “Overwriting writes 1s and 0s to the drive replacing only the user’s data but not the OS data, while formatting destroys the hard drive.”
  • “Overwriting replaces all the data with a single file that fills the hard drive destroying the data, while formatting erases all the data.”
  • “Nothing is different. They both destroy the data so no one can recover it.”

Answer : “Overwriting writes 1s and 0s to a hard drive replacing the data, while formatting only clears the reference to the data and only overwrites as space is used.”

SY0-401 CompTIA Security+ Certification Practice Exam Set 1

A website that attempts to mimic a bank website with malicious intent is known as which of the following?


Options are :

  • Phishing (Correct)
  • Social engineering
  • Malware
  • Shoulder surfing

Answer : Phishing

A technician is hardening the security on a wired SOHO router and needs the router to still be able to connect to the Internet. Which of the following methods would the technician do to achieve this?


Options are :

  • Enable WPA2
  • Disable the SSID broadcast
  • Disable unused ports (Correct)
  • Disable NAT

Answer : Disable unused ports

Joe, a user, reports that random pages are being printed on his printer. Which of the following can mitigate this from occurring?


Options are :

  • Enable static IP's
  • Change the default encryption key (Correct)
  • Change the network frequency
  • Disable the SSID broadcasting

Answer : Change the default encryption key

FC0-U41 CompTIA Strata IT Fundamentals Practice Exam Set 9

When setting up a new wireless router, which of the following actions should the technician take FIRST in order to secure the network? (Select TWO).A. Disable unused portsB. Change the SSIDC. Position the antennas to prevent outside accessD. Enable MAC filteringE. Change the default user name


Options are :

  • C,D
  • B,E (Correct)
  • A,D
  • A,B

Answer : B,E

Which of the following allows a user to reset their password with a series of security questions that only the user should know?


Options are :

  • Administration
  • Verification
  • Authentication (Correct)
  • Permission propagation

Answer : Authentication

Which of the following is one of the major differences between a new tablet and a new laptop computer?


Options are :

  • Laptops have slower responsiveness than tablets.
  • Laptop has less field functionality
  • Tablet has no field serviceable parts. (Correct)
  • Tablet has faster Ethernet capability

Answer : Tablet has no field serviceable parts.

SY0-401 CompTIA Security+ Certification Practice Exam Set 10

Which of the following has the HIGHEST level rights?


Options are :

  • Power User (Correct)
  • Standard User
  • Guest User
  • Remote Desktop User

Answer : Power User

A user just bought an Android tablet and wants to connect to their work email. The user’s employer has a Microsoft Exchange server for email. Which of the following would the technician configure to allow the user to access email on the Android tablet? 


Options are :

  • IMAP, SNTP
  • Devices are incompatible
  • DNS, DHCP
  • POP3, SMTP (Correct)

Answer : POP3, SMTP

Which of the following protocols could a technician use to connect a smartphone to an email server? (Select TWO).A. SMTPB. POP3C. HTTPD. SNTPE. ICMP


Options are :

  • C,D
  • B,C
  • D,E
  • A,B (Correct)

Answer : A,B

N10-006 CompTIA Network+ Certification Practice Test Set 5

Which of the following would a technician use to install applications onto an iPad? (Select TWO). A. App Store B. Market Place C. iTunes D. Exchange E. Mobile Market 


Options are :

  • A,C (Correct)
  • D,E
  • A,B
  • B,C

Answer : A,C

An administrator is asked to review a file on a local drive. The file contains what appear to be multiple conversations from emails, chat sessions, and various word processing files that were accessed during the past several days. Ann, the user, advises the administrator this was not a file she had created. The file is MOST likely created by which of the following?


Options are :

  • Phishing
  • Malware
  • Keylogger (Correct)
  • Social engineering

Answer : Keylogger

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions