NEW! CompTIA A+ 2019 Cert. Core 2 (220-1002) Practice Tests Set 7

Which attribute keeps a file from being displayed when the DIR command is performed?


Options are :

  • Hidden
  • Read-Only
  • Archive
  • Protected

Answer :Hidden

CA1-001 CompTIA Advanced Security Practitioner Practice Exam Set 4

Which of the following commands will show you a NIC's MAC address?


Options are :

  • IPCONFIG /MAC
  • IPCONFIG /ADDRESS
  • IPCONFIG /ALL
  • IPCONFIG

Answer :IPCONFIG /ALL

Which type of conditions promote ESD?


Options are :

  • Cool, dry air
  • Cool, moist air
  • Warm, moist air
  • Warm, dry air

Answer :Cool, dry air

The shared folder named C$ is an example of which of the following?


Options are :

  • Local share
  • Inheritance
  • Permission propagation
  • Administrative share

Answer :Administrative share

LX0-104 CompTIA Linux+ [Powered by LPI] Exam Set 6

Which of the Event Viewer sections records failed hardware events?


Options are :

  • Security
  • Application
  • Antivirus
  • System

Answer :System

Which Control Panel applet enables you to view but not change the status of critical security information for a Windows 7 computer?


Options are :

  • Windows Defender
  • Security Center
  • Internet Options
  • Programs and Features

Answer :Security Center

Sylvia's café sits tucked into a small shopping area with other businesses close by. She offers free, open Wi-Fi for customers, but wants to make sure other businesses cannot leach her bandwidth. What offers the best solution to retain open Wi-Fi, but limit it to customers?


Options are :

  • Adjust the power levels on the WAP
  • Apply MAC filtering
  • Apply content filtering
  • Change the default SSID
  • Enhance the firewall

Answer :Adjust the power levels on the WAP

CA1-001 CompTIA Advanced Security Practitioner Practice Exam Set 3

Karl wants to make a new folder on his Desktop. Which of the following will work?


Options are :

  • Click on the Desktop, Press F2, then select New | Folder.
  • Double-click on the Desktop, then select New | Folder.
  • Right-click on the Desktop, then select New | Folder.
  • Ctrl-Right-click on the Desktop, then select New | Folder.

Answer :Right-click on the Desktop, then select New | Folder.

Which of the following user account types can create other user accounts?


Options are :

  • Limited User
  • Administrator
  • Restricted User
  • Standard User

Answer :Administrator

In Windows, how would you go about sharing your CD-ROM on a network?


Options are :

  • In My Computer, right-click the CD-ROM icon, then click Sharing
  • Right-click My Computer and select Control Panel, then click Network, File and Print Sharing
  • Select Start | Settings | Control Panel, then click Network, File and Print Sharing
  • Select Start | Settings | Control Panel, then right-click Network, CD-ROM, Sharing

Answer :In My Computer, right-click the CD-ROM icon, then click Sharing

CompTIA JK0-015 E2C Security+ Certification Practice Test Set 4

On Dana's third day on the job as a receptionist, a nice-looking guy approaches her and says, "Hi, I'm Jake, and this is my first day. Could I borrow your internal phone directory?" What should she do?


Options are :

  • Ask him to verify his employment in some fashion.
  • Loan him the internal directory. He's in the office, so he's probably fine.
  • Never give information to someone you don't already know.
  • Call the police.

Answer :Ask him to verify his employment in some fashion.

Which of the following questions is NOT accusatory?


Options are :

  • Why are you doing that?
  • Who taught you that?
  • When is this happening?
  • What did you do?

Answer :When is this happening?

Darlene's computer is set up so that when she enters her user name and password in the morning, she has access to all her programs. What type of security applies here?


Options are :

  • Inheritance
  • SSO
  • Permission propagation
  • MFA

Answer :SSO

NEW! CompTIA A+ 2019 Cert. Core 2 (220-1002) Practice Tests Set 9

A technician is creating an image that will be used to deploy Windows 7 to 100 PCs. Which of the following tools should be used to accomplish this?


Options are :

  • DISKPART
  • Windows 7 Advisor
  • SYSPREP
  • CHKDSK

Answer :SYSPREP

Which of the following is the most secure method, short of physical destruction, that would be used to ensure that data on a hard drive cannot be recovered?


Options are :

  • Format the drive
  • Use an overwrite program
  • Repartition the drive
  • Use a degaussing tool

Answer :Use a degaussing tool

Which of the following is the BEST description of Safe Mode?


Options are :

  • Safe Mode limits system changes.
  • Safe Mode uses minimal drivers and all the default settings to aid in troubleshooting.
  • Safe Mode enables antivirus applications to safely check the system.
  • Safe Mode enables the Plug and Play options to load safely.

Answer :Safe Mode uses minimal drivers and all the default settings to aid in troubleshooting.

BR0-003 CompTIA A+ 2009 Edition Bridge Practice Exam Set 7

How should a user manually back up their registry?


Options are :

  • Open the registry | Edit | Export | pick location to save to
  • Open the registry | File | Export | pick location to save to
  • Open the registry | Save | pick location to save to
  • Open the registry | File | Save | pick location to save to

Answer :Open the registry | File | Export | pick location to save to

Which of the following devices most likely will require a driver install?


Options are :

  • Projectors
  • Speakers
  • Monitors
  • Scanners

Answer :Scanners

Electrostatic discharge occurs between ______________.


Options are :

  • Two objects when the relative humidity is low.
  • Two objects that have dissimilar electric potential.
  • Two objects when they are removed from their protective bags.
  • Two objects that are not grounded.

Answer :Two objects that have dissimilar electric potential.

JK0-016 CompTIA Network+ 2009 Edition Practice Exam Set 1

Which command prompt command will enable you to see all the files in the C:\FRED folder with the extension EXE?


Options are :

  • DIR FRED *.EXE
  • DIR C:\FRED\*.EXE
  • DIR C:\FRED\?.EXE
  • DIR *.EXE C:\FRED

Answer :DIR C:\FRED\*.EXE

The process of keeping a PC's operating system up-to-date is called:


Options are :

  • Preventive Maintenance.
  • Security Protocol.
  • Patch Management.
  • Upgrading.

Answer :Patch Management.

Which of the following actions would best show a computer was connected to the Internet?


Options are :

  • Pinging your router
  • Pinging www.comptia.org
  • Pinging localhost
  • Pinging your DNS server

Answer :Pinging www.comptia.org

CompTIA A+ 220 901

A user reports that icons appeared on the desktop after visiting a website. The technician reviews the system and  identifies that the system has malware. Which of the following procedures would be performed NEXT?


Options are :

  • Quarantine infected system
  • Educate the user on using the internet safely.
  • Scan the system for malware, and verify security updates are current.
  • Report the issue to the information security officer.
  • Disable System Restore

Answer :Quarantine infected system

On Ed's first day as the one and only IT guy for a small marketing firm, he notices that all the UTP network cable is simply running loose along the floorboards. What is his best course of action?


Options are :

  • Hire a network cabling company and upgrade to fiber-optic.
  • Secure the wires using cable runways.
  • Tape down the cables where needed.
  • Abandon the wired network and go wireless.

Answer :Secure the wires using cable runways.

What network service provides dynamic IP addresses?


Options are :

  • DNS
  • DHCP
  • Router
  • HTTP

Answer :DHCP

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 14

Phishing is:


Options are :

  • A technique used to obtain financial information from a user by compiling information from social networks and their friends
  • An infection that causes a Web browser to go to a different site than the one intended from a search result page
  • A technique used to obtain financial information from a user by sending e-mails which mimic a bank
  • An infection that causes a computer to behave erratically by playing music and launching browser windows

Answer :A technique used to obtain financial information from a user by sending e-mails which mimic a bank

How do you update a sound card driver in Windows 10?


Options are :

  • Right-click My Computer and select Properties, select the Hardware tab, select Drivers, select Sound Devices, then click Update My Driver.
  • In Computer Management, select Device Manager, right-click the sound device and select Properties, click the Driver tab, and click Update Driver.
  • In the Control Panel, select Sound Devices, click the Drivers Tab, and then click Update.
  • In the Control Panel, select System, select Drivers, select Sound Devices, then click Update Driver.

Answer :In Computer Management, select Device Manager, right-click the sound device and select Properties, click the Driver tab, and click Update Driver.

Kevin gets a call from a user who is trying to install a new piece of software. The user doesn't have administrative rights, so she's unable to install the software. What tool can Kevin use to install the software for the user without giving the user the local administrator password?


Options are :

  • Remote Assistance
  • Computer Management
  • Regedit
  • Remote Desktop

Answer :Remote Desktop

CAS-001 CompTIA Advanced Security Practitioner Practice Exam Set 6

What does the System Information utility do?


Options are :

  • Enables you to perform automatic custom backups of your files and settings
  • Enables you to schedule hard drive defragmentation, CHKDSK scans, and other computer tasks
  • Provides you with a report about the hardware resources, components, and software environment in your computer
  • Enables you to select which programs and services start when Windows boots up

Answer :Provides you with a report about the hardware resources, components, and software environment in your computer

Jodie suspects that her hard drive has bad sectors. Steve says she needs to run DEFRAG to fix the problem areas, but Maria disagrees. She tells Jodie to run CHKDSK. Who is correct?


Options are :

  • Only Steve is correct. DEFRAG is the proper tool here.
  • Only Maria is correct. CHKDSK is the proper tool here.
  • Both Steve and Maria are correct. Either tool will fix the problem.
  • Neither Steve nor Maria is correct. Jodie should run FDISK.

Answer :Only Maria is correct. CHKDSK is the proper tool here.

When speaking to a customer:


Options are :

  • Speak only when spoken to.
  • Use clear, direct statements.
  • Avoid eye contact.
  • Show them that you are highly skilled and that their equipment is in good hands.

Answer :Use clear, direct statements.

CAS-001 CompTIA Advanced Security Practitioner Practice Exam Set 2

Which of the following programs enables you to edit NTFS permissions from a command line?


Options are :

  • NTFS
  • ROOT
  • CACLS
  • CHMOD

Answer :CACLS

A frustrated user calls in for tech support. She installed three new programs, but now Windows 7 won't load. What can she do to determine which program is at fault? She doesn't want to uninstall all three programs. Select the best answer.


Options are :

  • Boot the computer into Safe Mode. Go to the Control Panel | Administrative Tools | Event Viewer.
  • Boot the computer into Safe Mode with Command Prompt. At the prompt type CHKDSK /PROGRAMS to run a scan on installed applications.
  • She needs to uninstall the three programs and reinstall them one at a time, testing Windows startup.
  • Boot the computer into Safe Mode with Networking and do an Internet searches for the three programs to see if other people have had problems.

Answer :Boot the computer into Safe Mode. Go to the Control Panel | Administrative Tools | Event Viewer.

A home user calls into the Help Desk. Her Windows 10 computer worked fine last night. This morning, however, none of the devices plugged into the computer work: no mouse, keyboard, or even printer. She rebooted twice and got the same error. What should fix this problem?


Options are :

  • Restore hidden updates.
  • Roll back updates.
  • Disable the Windows Update service.
  • Check for updates.

Answer :Roll back updates.

CompTIA 220-801 A+ Advanced Certification Practice Exam Set 3

A user reports that the Web browser shortcut key on his laptop's keyboard isn't working. What would a technician do to resolve the problem?


Options are :

  • Installing ACPI drivers from a manufacturer's Web site
  • Installing AHCI drivers from a manufacturer's Web site
  • Installing hotkey drivers from a manufacturer's Web site
  • Installing Bluetooth drivers from a manufacturer's Web site

Answer :Installing hotkey drivers from a manufacturer's Web site

To connect to a PC using RDP, what port should you open?


Options are :

  • 80
  • 443
  • 21
  • 3389

Answer :3389

Which of the following is NOT an APM/ACPI level?


Options are :

  • Standby
  • Shut Down
  • Enabled
  • Full On

Answer :Shut Down

CompTIA JK0-022 E2C Security+ Compliance & Operational Exam Set 7

Which of the following would help during a power outage?


Options are :

  • Line conditioner
  • Power strip
  • Battery backup
  • Surge suppressor

Answer :Battery backup

A user reports that every time he uses a search engine and clicks on a link to go to a website, he is instead taken to a site blocked by his company's content filter. The user is not trying to go to the blocked site, but he needs to be able to successfully use the search engine to complete his assignment. Which of the following tools would a technician use to best resolve this issue?


Options are :

  • Recovery console
  • Anti-malware software
  • Factory pre-installation
  • System restore

Answer :Anti-malware software

Which application reorganizes files on a disk in order to optimize hard disk drive performance?


Options are :

  • FDISK
  • DEFRAG
  • OPTIMIZE
  • CHKDSK

Answer :DEFRAG

FC0-U41 CompTIA Strata IT Fundamentals Practice Exam Set 9

A user states that their old notebook loses connectivity to the Internet several times a day at work and at home. The issue started after the wireless card was replaced. Which of the following items is most likely causing the issue?


Options are :

  • The motherboard drivers are not current.
  • The drivers for the NIC need to be updated.
  • The wireless on/off switch is not in the on position.
  • The keyboard is faulty and turns the wireless NIC on and off.

Answer :The drivers for the NIC need to be updated.

Which of the following would be a digital security prevention method?


Options are :

  • RFID badge
  • Biometrics
  • ID badge
  • Load balancer
  • Mantrap

Answer :RFID badge

The first thing you should try when a Windows application locks up is __________.


Options are :

  • Press CTRL + ESC.
  • Press CTRL + ALT + DEL to invoke Task Manager.
  • Press CTRL + BREAK.
  • Shut down the system and wait 10 seconds before re-booting.

Answer :Press CTRL + ALT + DEL to invoke Task Manager.

CT0-101 Convergence+ Certification Practice Exam Set 12

Which of the following is the best way to ensure you've made a quality backup?


Options are :

  • Do only full backups
  • Run backups when the least number of users are online
  • Verify your backup
  • Always close all files before a backup

Answer :Verify your backup

Which Windows utility backs up critical files and settings and enables you to roll back to a previous state?


Options are :

  • System Restore
  • Registry
  • Microsoft Management Console
  • System Information

Answer :System Restore

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions