NEW! CompTIA A+ 2019 Cert. Core 2 (220-1002) Practice Tests Set 12

After installing an update on her MacBook, a user contacts the technician to complain that the WiFi is not working. The WiFi icon displays that it has connectivity, but the user is unable to browse. Which of the following could be the issue?


Options are :

  • The user's iCloud account is compromised.
  • Uninstall the upgrade.
  • PRAM needs to be reset
  • Reboot your router.

Answer :PRAM needs to be reset

Louis is using the Web interface to configure his SOHO home router/access point. At this exact moment, none of his own computers are on the wireless network. He goes into a screen called "active clients" only to see that a computer he doesn't recognize is on his network. What should he do?


Options are :

  • Reassess and add better security to his wireless network
  • Immediately call the police
  • Install a Wireless Intrusion Detection System to track down this hacker
  • Shut down the router

Answer :Reassess and add better security to his wireless network

Phil wants to set up BitLocker on his computer. He has a TPM chip on his motherboard and Windows 7 Ultimate. How many volumes will be created to use BitLocker?


Options are :

  • 2
  • 3
  • 1
  • 4

Answer :2

Which of the following is an example of an open-ended question?


Options are :

  • How may I help you?
  • What's your employee ID?
  • Is this correct?
  • What symptoms appeared and when?

Answer :How may I help you?

Jamie has just finished cleaning up a virus infection on a customer's computer. Which of the following should Jamie do last?


Options are :

  • Educate the end user
  • Enable system restore and create restore point
  • Schedule regular virus scans and updates
  • Update the definitions on antivirus software

Answer :Educate the end user

FC0-U51 CompTIA IT Fundamentals Certification Exam Set 12

The one thing that CHKDSK does NOT repair is _______________.


Options are :

  • bad clusters
  • directory structures
  • fragmented files
  • cross-linked files

Answer :fragmented files

You are about to install a microATX motherboard in an ATX computer case. What should you do FIRST?


Options are :

  • You cannot install a microATX motherboard into an ATX case
  • Put on your anti-static wrist strap
  • Remove the processor
  • Remove the power supply unit

Answer :Put on your anti-static wrist strap

A turnstile is an example of which of the following forms of physical security?


Options are :

  • Mantrap
  • Biometrics
  • Key pad
  • Cipher lock

Answer :Mantrap

CompTIA Network+ (N10-007) 6 Practice Exams and Simulations Set 5

What should you do with a worn-out Li-Ion battery?


Options are :

  • Throw it away
  • Return it to the manufacturer for a trade in.
  • Contact your local disposal authority for guidance.
  • Recharge it.

Answer :Contact your local disposal authority for guidance.

Tammy can successfully run the command PING 192.168.4.1 on her system. If Tammy types PING -t 192.168.4.1 on her system, how will the "-t" switch change the results of the PING command?


Options are :

  • The "-t" switch tells the PING command to ping showing time-to-live values.
  • The "-t" switch tells the PING command to ping 10 times.
  • The "-t" switch tells the PING command to ping 4 times.
  • The "-t" switch tells the PING command to ping continuously.

Answer :The "-t" switch tells the PING command to ping continuously.

After walking across a carpet, you pick up a known good stick of RAM and install it. When you try to boot the machine, you find the RAM no longer works. What it the most likely cause?


Options are :

  • Radio frequency interference (RFI)
  • Electrostatic discharge (ESD)
  • Electromagnetic interference (EMI)
  • Voltage oscillation corruption (VOC)

Answer :Electrostatic discharge (ESD)

Practice : CompTIA Network+ (N10-007)

Which of the following is a danger with discarded CRT monitors?


Options are :

  • Li-Ion
  • Arsenic
  • Static Discharge
  • Vacuum

Answer :Vacuum

Angel is new to the job and is making lists of data his company uses that gets regulated by corporate interests and by government regulations. Which of the following is considered government-regulated data?


Options are :

  • End-user license agreement
  • PHI
  • DRM
  • Digital Millenium Copyright Act

Answer :PHI

Which of the following types of screen locks is the MOST secure way to secure your mobile device?


Options are :

  • Fingerprint lock
  • Passcode lock
  • Face lock
  • Swipe lock

Answer :Passcode lock

CompTIA MB0-001 Mobility+ Certification Practice Exam Set 4

Which of the following file systems enable you to encrypt an image, thus making it un-viewable by any account except your own?


Options are :

  • EFS
  • FAT
  • FAT32
  • OSR

Answer :EFS

Which error would CHKDSK most likely be able to repair?


Options are :

  • No ROM basic, system halted
  • Data error reading drive C:
  • No boot device present
  • Incorrect partition type

Answer :Data error reading drive C:

Which Windows tool would enable a user to recover his encrypted files if he forgets his password?


Options are :

  • BitLocker
  • Password reset disk
  • Password restore disk
  • Encrypting File System

Answer :Password reset disk

FC0-U41 CompTIA Strata IT Fundamentals Practice Exam Set 8

While trying to access a secure Web page, Karen gets an error telling her the domain names for the site and the certificate are mismatched. The site is a small "Mom and Pop" Web site, but she's about to order $1500.00 worth of merchandise. What should she do?


Options are :

  • Stop and call the store.
  • Go ahead and make the transaction.
  • Do not accept the certificate, but do the transaction anyway.
  • Try using TCP port 8080 to confirm the HTTPS is intact.

Answer :Stop and call the store.

A technician needs to initiate a Remote Desktop Assistance connection for a customer who is experiencing email issues. Once the customer agrees, what should the technician ask the customer to complete, prior to establishing the connection?


Options are :

  • Reboot the system.
  • Take steps to reproduce the problem.
  • Close any files that are personal.
  • Log off, and log back on.

Answer :Close any files that are personal.

What does Windows 7 's User Account Control (UAC) do?


Options are :

  • Prevents unauthorized user access of privileged data
  • Prevents users from accidently deleting critical files
  • Prevents programs from running with escalated privileges without your knowledge
  • Prevents malware from attacking your critical files

Answer :Prevents programs from running with escalated privileges without your knowledge

FC0-U51 CompTIA IT Fundamentals Certification Exam Set 10

When working on a Windows 7 computer, which option will be available to you when you are presented with the Recovery Environment dialog box?


Options are :

  • System Information utility
  • System Restore
  • Services
  • Performance Monitor

Answer :System Restore

A technician has a computer locked in a cabinet in the office that shares a printer and some files. The computer must remain on. Which of the following Control Panel options would be used to control the users that are able to shut the computer down?


Options are :

  • Security Center
  • Local Security Policy
  • System
  • Power Options

Answer :Local Security Policy

Which of the following command-line utilities is designed to edit the BOOT.INI file?


Options are :

  • Cacls
  • Regedit
  • Bootcfg
  • Sigverif

Answer :Bootcfg

CompTIA JK0-801 A+ Laptops Printers and Operational Exam Set 8

If an application does NOT appear on the Start menu, but you know that it is on the hard drive, how can you run the program?


Options are :

  • Open Windows Explorer, navigate to the application's folder, and double-click the program's executable file.
  • You cannot run an application that is not in the Start Menu.
  • Go to Start/Run and type COMMAND. From the command prompt, change directories to the application's folder and press Enter.
  • Open Windows Explorer, navigate to the application's folder, and press the F1 key.

Answer :Open Windows Explorer, navigate to the application's folder, and double-click the program's executable file.

A drive configured as a basic disk in Disk Management cannot support what feature?


Options are :

  • RAID
  • Sharing
  • Disk Administration
  • NTFS

Answer :RAID

A user reports that there is a metallic burning smell from their CRT monitor. Which of the following should be taken into consideration before attempting to resolve the customer's issue?


Options are :

  • Have compressed air available to clear out the debris.
  • Allow the CRT power supply to drain all power.
  • Use anti static procedures.
  • CRT monitors should be serviced by qualified personnel.

Answer :CRT monitors should be serviced by qualified personnel.

CompTIA A+ 220 902 Test Set 1

Jan, a customer, states that another technician just removed malware from her computer and now she is not able to connect to Web sites such as Windows Update, but she is able to connect to others. Which of the following is the most likely cause of the issue?


Options are :

  • The HOSTS file has been tampered with
  • NIC driver is corrupt
  • The Web browser's cache is full
  • Not all the malware has been eliminated

Answer :The HOSTS file has been tampered with

A contractor needs to destroy several drives containing confidential information so that they can never be used again. Which of the following destruction methods would best accomplish this task?


Options are :

  • Sanitize the hard drives
  • Format the hard drives
  • Overwrite the hard drives
  • Drill into the hard drives

Answer :Drill into the hard drives

Erica sits at her desk and tries to log into the accounting server with her laptop, but she’s prompted for a user name and password. What kind of authentication, if any, does this represent?


Options are :

  • RADIUS
  • None; this is authorization.
  • Single-factor
  • Multifactor
  • TACACS

Answer :Single-factor

JK0-016 CompTIA Network+ 2009 Edition Practice Exam Set 11

Wearing an anti-static wrist strap while installing a CPU protects ________ from ESD.


Options are :

  • Both
  • You
  • The CPU
  • Neither

Answer :The CPU

As a member of the accounting group, John has Write permission to the Database folder; as a member of the technicians group, John has Read permission to the Database folder. What permission or permissions does John have to the Database folder?


Options are :

  • Full Control
  • Write only
  • Read and Write
  • Read only

Answer :Read and Write

A user wants to change what happens when a laptop's lid is closed. Which of the following Control Panel applets is the most direct way to adjust this?


Options are :

  • Display
  • Device Manager
  • Personalization
  • Power Options

Answer :Power Options

CAS-001 CompTIA Advanced Security Practitioner Practice Exam Set 11

Where are software firewalls usually located?


Options are :

  • On the servers
  • On the client systems
  • On every node
  • On the routers

Answer :On the client systems

Even after his impassioned secure password meeting, Paul is frustrated by the overly simplistic passwords his users use to login into Windows. What can Paul do to make sure his users create truly random, challenging passwords?


Options are :

  • Show users how to combine a pet's name with his or her own name
  • Have users use a password generator program to make their passwords
  • Make users change their passwords every 30 days
  • Have users make password of at least 15 characters in length

Answer :Have users use a password generator program to make their passwords

A customer reports that their wireless laptop cannot connect after removing it from its carrying case. The laptop boots and the user is able to login. Which of the following should be checked first?


Options are :

  • External Wi-Fi switch
  • Available hard drive space
  • Laptop battery levels
  • Status in Device Manager

Answer :External Wi-Fi switch

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 26

Most laptops show they are in hibernation mode by:


Options are :

  • A flashing Battery Power LED
  • A flashing Power LED
  • A flashing NumLock or CapsLock LED
  • A flashing Sleep LED.

Answer :A flashing Power LED

In Windows, how do you close an application that has stopped responding?


Options are :

  • Open Task Manager, select the Applications tab, select the application, then click the End Task button.
  • Open Device Manager, right-click on the application, select Disable from the popup menu.
  • Click and hold your mouse button on the application's Taskbar icon, then select Force Quit from the popup dialog box.
  • Open Task Manager, select the Applications tab, select the application, click the Switch To button.

Answer :Open Task Manager, select the Applications tab, select the application, then click the End Task button.

When booting to Windows, a user receives several messages referring to a .dll file that cannot be found. Which of the following would be the BEST course of action for the technician?


Options are :

  • Run Windows Update utility to replace the DLL file.
  • Copy the .dll file from another PC.
  • Research the file to identify the application which uses the .dll.
  • Run defrag utility to correct any file damage.

Answer :Research the file to identify the application which uses the .dll.

JK0-019 CompTIA E2C Network + Certification Exam Set 10

Turnstiles and other mantraps will prevent which of the following security threats?


Options are :

  • Shoulder surfing
  • Viruses
  • Rootkits
  • Tailgating

Answer :Tailgating

Mike wants to baseline his new computer. What tool should he use?


Options are :

  • Windows Baseline
  • Task Manager
  • Performance Monitor
  • Event Viewer

Answer :Performance Monitor

How can you insulate yourself from ESD without an ESD bracelet?


Options are :

  • Hold the metal of the case
  • Hold on to the power cord
  • Unplug the PC
  • Take off their shoes

Answer :Hold the metal of the case

CompTIA LX0-102 Linux Part 2 Certification Practice Exam Set 3

The part of your hard drive that contains the MBR is called the:


Options are :

  • Extended partition
  • Boot sector
  • Logical drive
  • Primary partiton

Answer :Boot sector

For any given 802.11n wireless Internet signal, which of the following is needed to establish a connection?


Options are :

  • MAC address filtering
  • SSL certificate
  • Proper SSID
  • Windows password

Answer :Proper SSID

Which of the following is NOT a type of file attribute?


Options are :

  • Administrator
  • System
  • Hidden
  • Read-Only

Answer :Administrator

CA1-001 CompTIA Advanced Security Practitioner Practice Exam Set 4

When cleaning a computer monitor, always spray the cleaning solution on:


Options are :

  • The front of the monitor
  • A thin sponge
  • A lint-free cloth
  • A polishing cloth

Answer :A lint-free cloth

Karen is unable to access the Internet on her home network, but she can access both her roommate's computer and her home theater PC. She thinks her router might not be working. Which of the following tools could she use to test this theory?


Options are :

  • TRACERT
  • ICACLS
  • IPCONFIG /all
  • NET VIEW

Answer :TRACERT

John can ping any other computer on his LAN by IP address or name. He can also ping hosts outside his network by IP address or Fully Qualified Domain Name (FQDN). However, when he opens his Web browser, he's unable to access any Web sites. Which of the following problems is the MOST likely cause? Below is his current IPCONFiG. C:\>ipconfig Windows IP Configuration Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . : total.local IP Address. . . . . . . . . . . . : 192.168.4.76 Subnet Mask . . . . . . . . . . . : 255.255.255.0 Default Gateway . . . . . . . . . : 192.168.4.1


Options are :

  • His router is blocking outgoing port 443.
  • His DHCP server is down.
  • His DNS server is down.
  • His proxy server settings are wrong.

Answer :His proxy server settings are wrong.

CompTIA Security+ Certification (SY0-501): Practice Tests

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions