NEW! CompTIA A+ 2019 Cert. Core 2 (220-1002) Practice Tests Set 10

A client has asked a technician about drive sanitation and wants to know the difference between overwriting a drive and quick formatting a drive. Which of the following would be the best response from the technician?


Options are :

  • Overwriting writes 1s and 0s to the drive, which replaces the user's data, but not the OS data. Quick formatting destroys the hard drive.
  • Overwriting replaces all the data with a single file that fills the hard drive, destroying the data. Quick formatting erases all the data.
  • Overwriting writes 1s and 0s to a hard drive, replacing all the data. A quick format only clears the references to the data, so the data is only overwritten as new data is saved to the drive.
  • Nothing is different. They both destroy the data so no one can recover it.

Answer :Overwriting writes 1s and 0s to a hard drive, replacing all the data. A quick format only clears the references to the data, so the data is only overwritten as new data is saved to the drive.

Which of the following paths will open Event Viewer?


Options are :

  • Start | Control Panel | Event Viewer
  • Start | Control Panel | Accessories | Event Viewer
  • Start | Control Panel | Administrative Tools | Event Viewer
  • Start | Programs | Administrative Tools | Event Viewer

Answer :Start | Control Panel | Administrative Tools | Event Viewer

Which of the following is a legitimate way to update your anti-malware program?


Options are :

  • See if the anti-malware program has an automatic update feature.
  • Virus definitions must be loaded manually.
  • Use Task Scheduler.
  • Use Windows Update.

Answer :See if the anti-malware program has an automatic update feature.

CompTIA Cyber Security Analyst (CySA+) Practice Exams 2019 Set 5

A technician has just installed a new SOHO router for several users to share an Internet connection. He received a call that, when one user streams media, the remaining user's browsing speed slows. What can the technician adjust, so the experience is universal for all users?


Options are :

  • WAN
  • DSL
  • QoS
  • VNC

Answer :QoS

Which of the following file systems enable you to encrypt an image, thus making it un-viewable by any account except your own?


Options are :

  • FAT
  • OSR
  • EFS
  • FAT32

Answer :EFS

A new application is installed which adds three new services to a customer's PC. The customer asks for help, because the new application will not start. A technician investigates and finds that one of the services has failed to start. They attempt to manually start the service, but it fails. Where should the technician look next for more information? (Select two.)


Options are :

  • System registry
  • Log files for the new application
  • %SystemDir%\system32\Drivers
  • Event Viewer
  • Task Manager

Answer :Log files for the new application Event Viewer

CompTIA A+ (220-1002) Test Prep, Exams and Simulations Set 4

The command line interface command to delete a directory in Windows 7 Professional is ________.


Options are :

  • REMOVE
  • DEL
  • RD
  • ERASE

Answer :RD

What tool can you use in the Recovery Console to partition a hard drive?


Options are :

  • PARTITION
  • Disk Management
  • DISKPART
  • FDISK

Answer :DISKPART

After installing a thumbprint reader, you must also _______ it.


Options are :

  • Defrag
  • Train
  • Enable
  • Reset

Answer :Train

JK0-015 CompTIA E2C Security+ 2008 Edition Practice Exam Set 1

John worked on his PowerPoint presentation yesterday, but today the program won't run. What Windows tool or option should he try to get PowerPoint working again?


Options are :

  • Last Known Good Configuration
  • Safe mode with networking
  • System Restore
  • Safe mode

Answer :System Restore

Technician Jason tests several computers on the LAN for connectivity to a secure Web server (using port 443 and HTTPS). Five of the computers connected properly, but one received an invalid certificate error. What should Jason change on the non-connecting computer to fix the problem?


Options are :

  • Logon times
  • UAC settings
  • Boot sequence
  • Date and time

Answer :Date and time

What protocol should you follow when handling evidence in a criminal investigation?


Options are :

  • Chain of custody
  • Change control management
  • MSDS documents
  • Channel escalation

Answer :Chain of custody

SY0-401 CompTIA Security+ Certification Practice Exam Set 6

An incident response technician responds to a request for investigation about illegally obtained movies. The technician finds that a user has been violating company policy and illegally downloading movies. Which of the following would be the next BEST step for this technician to perform?


Options are :

  • Isolate the workstation in a limited access facility.
  • Delete all unauthorized materials.
  • Reprimand the user, and remove violating materials.
  • Document the incident, purge all policy violating materials.

Answer :Document the incident, purge all policy violating materials.

Mario sets up a kiosk at a convention. Here's the scenario. First, the kiosk needs to log in automatically whenever it's rebooted. Second, the computer can only run Microsoft Edge for Web browsing. Users cannot have access to any other application. What account type should Mario use?


Options are :

  • Administrator
  • Guest
  • Remote Desktop User
  • Power User

Answer :Guest

Police commisioner Gordan has noticed a rash of laptop thefts throughout Gotham city offices. What can he recommend to Gotham's citizens as the most effective way to prevent laptop theft?


Options are :

  • A retina scanner
  • A cable lock
  • A CCTV system
  • A badge reader

Answer :A cable lock

CompTIA CySA+ (CS0-001) 5 Practice Certification Exams Set 7

The chain of custody is:


Options are :

  • The chain used to beat you into submission
  • Another name for hand cuffs
  • A documented history of who has been in possession of a system
  • Several smaller custodies linked together

Answer :A documented history of who has been in possession of a system

Which of the following can be achieved with Group Policy to help with workstation security measures?


Options are :

  • Password complexity requirements
  • Wake on LAN
  • BitLocker password
  • BIOS password

Answer :Password complexity requirements

Tammy's computer is generating seemingly random Blue Screens of Death, making her suspect a bad device driver. What handy Windows tool can she run to check all her device drivers?


Options are :

  • Sigverif
  • Device Manager
  • Driver Verifier Manager
  • Debug Mode

Answer :Driver Verifier Manager

CompTIA Security+ (SY0-501) Practice Exams with Simulations Set 9

Colby is working in the command line. He knows there are hidden files and folders on the drive. How would he show all the hidden files and folders?


Options are :

  • DIR /w/p
  • DIR /H
  • DIR +H
  • DIR /AH

Answer :DIR /AH

You are working the 8:00 AM shift at the help desk. An irate user who fails to identify himself calls in claiming that his workstation is malfunctioning and that you need to fix it NOW. What is the first action you should take?


Options are :

  • Scold him for his tone of voice and tell him to call back when he has calmed down.
  • Tell the user you will send a technician over right away.
  • Recognize the urgency of the situation and escalate the user's complaint to level 2 tech support.
  • Calmly ask him for his name and a more detailed explanation of the problem.

Answer :Calmly ask him for his name and a more detailed explanation of the problem.

Dana, a Tier 2 help desk tech at Highland Gadgets, Corp., gets that dreaded call, an already-frustrated customer with a dead PC. After walking the customer through a few standard troubleshooting routines, the customer tells Dana that she's wasting his time. He's already tried everything she's suggested so far. What should Dana do next?


Options are :

  • Bump the customer up to Tier 3 tech support; that is, escalate the problem.
  • Tell the customer that she has a few more steps to try first, then follow the script as written for the troubleshooting steps.
  • Ask the customer open-ended questions to get closer to the underlying issue behind the PC that won't boot.
  • Question the user more aggressively, because his frustration clearly points to something he did that caused the problem.

Answer :Ask the customer open-ended questions to get closer to the underlying issue behind the PC that won't boot.

CompTIA MB0-001 Mobility+ Certification Practice Exam Set 8

A technician is working on a workstation that is receiving read/write failures when trying to access a particular file. Which of the following commands should the technician use to resolve this issue?


Options are :

  • DISKPART
  • CHKDSK
  • FDISK
  • FORMAT

Answer :CHKDSK

Under what Control Panel applet is Computer Management located?


Options are :

  • System
  • Administrative Tools
  • Security Center
  • Control Center

Answer :Administrative Tools

Ursula needs to configure a Cisco router using the USB serial port adapter on her Windows laptop. The router documentation says the COM port needs to be set to: 9600 bits/sec, 8 data bits, no parity, one stop bit. Where does she go to make these settings for the serial port?


Options are :

  • Phone and Modem Control Panel applet
  • Sound Control Panel applet
  • CMOS
  • Device Manager

Answer :Device Manager

CompTIA JK0-015 E2C Security+ Certification Practice Test Set 6

James reports that his workstation is very sluggish today. When Sylvia the tech explores the computer, she notices a ton of background programs running, many of which she doesn't recognize. James comments that one of the users of the computer added a program downloaded from the Internet recently. What's most likely the problem?


Options are :

  • The workstation has keylogger malware.
  • The workstation has ransomware malware.
  • The workstation has rootkit malware.
  • The workstation has Trojan Horse malware.

Answer :The workstation has Trojan Horse malware.

When securing a new wireless router, which of the following should be changed first?


Options are :

  • Default SSID
  • Radio power levels
  • DHCP settings
  • Default password

Answer :Default password

A user starts yelling at you over the phone. You should:


Options are :

  • Don't take it personally.
  • Scold the user.
  • Yell back—he/she with the loudest voice wins.
  • Hang up on their rude behavior.

Answer :Don't take it personally.

SY0-401 CompTIA Security+ Certification Practice Exam Set 6

Which of the following power management modes takes more power but enables the PC to return to normal operation faster?


Options are :

  • Shutdown
  • Coma
  • Hibernate
  • Standby

Answer :Standby

What is the shortcut for viewing the properties/attributes of a file or folder in Windows?


Options are :

  • Hold down the TAB key and double-click on a file or folder.
  • Hold down the ALT key and double-click on a file or folder.
  • Hold down the CTRL key and double-click on a file or folder.
  • Hold down the SHIFT key and double-click on a file or folder.

Answer :Hold down the ALT key and double-click on a file or folder.

Information you see or hear while working on a repair at a job site:


Options are :

  • Is fair game
  • Should be reported to your boss
  • Can be told to your friends
  • Should stay at the job site

Answer :Should stay at the job site

CompTIA Cyber Security Analyst (CySA+) Practice Exams 2019 Set 12

Lenny is pretty sure he accepted a certificate that was invalid and now he wants to "unaccept it." Where does he go to do that?


Options are :

  • Windows Firewall
  • My Network Places Properties
  • Internet Options in Internet Explorer
  • Windows Security Center

Answer :Internet Options in Internet Explorer

Which type of virus propagates by tunneling through networks and the Internet?


Options are :

  • Trojan
  • Spider
  • Macro
  • Worm

Answer :Worm

Jan says that when she walks away from her laptop for a long period of time, she has to reconnect to the wireless network when she gets back. Which of the following will most likely correct this issue?


Options are :

  • Disable screensaver
  • Replace the Wi-Fi card
  • Adjust advanced power settings
  • Install a higher-capacity battery

Answer :Adjust advanced power settings

CompTIA CySA+ Set 3

A technician has just upgraded RAM on a user's Windows 7 workstation from 4GB to 8GB. The technician now wants to adjust the page file size on the system to the recommended Microsoft minimum settings. Which of the following is the Microsoft minimum page file?


Options are :

  • 8192MB
  • 16328MB
  • 12288MB
  • 4096MB

Answer :8192MB

What is the last thing a technician should do before transferring a confiscated computer to another department? Assume the computer was confiscated for illegal material.


Options are :

  • Preserve data
  • Identify prohibited activity on PC
  • Document change of custody
  • Report prohibited activity

Answer :Document change of custody

What is the generic term used for the process to determine the identity of a user logging into a system?


Options are :

  • Authorization
  • Indemnification
  • Identification
  • Authentication

Answer :Authentication

CompTIA Security+ SY0-501 Exam Preparation (Latest Version) Set 1

Which of the following is a safe way to deal with your new password?


Options are :

  • Put a note in your wallet.
  • Tape it under your keyboard.
  • E-mail it to yourself.
  • Memorize it.

Answer :Memorize it.

What is the single biggest social mistake a tech can make at a job site?


Options are :

  • Get angry
  • Get frustrated
  • Get confused
  • Get hurt

Answer :Get angry

In Windows, what function does virtual memory accomplish?


Options are :

  • It lets you know when you are about to run out of available memory.
  • It uses hard disk space to emulate system memory.
  • It enables you to control memory on another computer on a network.
  • It keeps track of daily file usage.

Answer :It uses hard disk space to emulate system memory.

Mock : CompTIA Cloud+ Certification

Which of the following can enable a technician to remove a virus that prevents users from updating their anti-virus software?


Options are :

  • Recovery Console
  • MSCONFIG
  • Regedit
  • Safe Mode

Answer :Safe Mode

If a user types in http://23.62.99.75 they get to the Barney the Dinosaur website, but if they enter www.barney.com they cannot. What Internet service needs to be checked?


Options are :

  • DNS
  • DHCP
  • NetBIOS
  • WINS

Answer :DNS

What can protect a computer from transient voltage that's too high but not too low?


Options are :

  • UPS
  • Power outlet
  • Ground fault interrupter
  • Surge suppressor

Answer :Surge suppressor

CV0-001 CompTIA Cloud+ Certification Practice Exam Set 7

You are on a service call. The customer tells you that he keeps finding new folders with names like "music" and "games" that he did not place there. After talking to the other employees to verify they did not place those files, you see they have an unencrypted wireless network. Which of the following actions is the LEAST NECESSARY response?


Options are :

  • Change all usernames and passwords.
  • Update the NTFS permissions on the system to prevent users from accessing any folder other than necessary ones.
  • Configure the wireless network for security.
  • Use only wired networking.

Answer :Use only wired networking.

Sam installs a brand-new second hard drive into his Windows system. The drive shows up in CMOS, but when he boots into Windows, he can't see the drive in Computer. What's wrong?


Options are :

  • The drive isn't mounted.
  • The drive is fragmented.
  • The drive isn't dynamic.
  • The drive isn't partitioned.

Answer :The drive isn't partitioned.

A technician is trying to reinstall Windows on a machine. He's already inserted the install disc in the optical drive, so what will he most likely have to configure next?


Options are :

  • Clock speeds
  • BIOS password
  • Flash BIOS for firmware upgrade
  • Boot sequence

Answer :Boot sequence

CompTIA CT0-101 Convergence+ Certification Practice Exam Set 3

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions