NEW! CompTIA A+ 2019 Cert. Core 2 (220-1002) Practice Tests Set 8

What is the purpose of User Account Control in Windows 7?


Options are :

  • To prevent applications on the system from running with escalated privileges without the user's approval.
  • To make system security more visible to the user.
  • To annoy the user.
  • To provide the user with visual feedback indicating he or she is modifying dangerous parts of the system.

Answer :To prevent applications on the system from running with escalated privileges without the user's approval.

220-802 CompTIA A+ Certification Practice Exam Set 7

Which of the following is NOT a way to stop a service in Windows?


Options are :

  • Right-click Computer | Manage | Services and Applications | Services | | Stop
  • Command Prompt | Net stop
  • Command Prompt | winsrv.msc | | Stop

    An application has frozen on the screen, although other programs are still running. How do you go about removing the frozen program?


    Options are :

    • Use MSINFO to turn off the program.
    • Click the Close button in the application's window.
    • Use Task Manager to shut down the program.
    • Use the Services Control Panel applet to shut down the program.

    Answer :Use Task Manager to shut down the program.

    What is the purpose of a driver?


    Options are :

    • It improves the performance of installed devices by optimizing access patterns.
    • It provides more useful memory by moving device control data to extended memory.
    • It tells the operating system how to interact with the device.
    • It modifies programs to work correctly with devices attached to a system.

    Answer :It tells the operating system how to interact with the device.

    CompTIA JK0-018 Security+ E2C Certification Practice Exam Set 6

    Lenny has just learned that laptops can share memory for video, and he is curious to find out how much RAM his laptop reserves for video. He is surprised to discover that all of his 1 GB of memory is shown being used by Windows. What's happening?


    Options are :

    • This laptop does not need any type of RAM for video.
    • The shared memory is so small that it's not even listed.
    • The video card shares its RAM for the operating system.
    • This laptop does not use shared memory.

    Answer :This laptop does not use shared memory.

    Every time Will opens a Web page, three or four pop-ups appear, even with his pop-up blocker turned on. Which of the following programs should he run to get rid of these annoyances?


    Options are :

    • Anti-malware
    • Anti-spyware
    • Anti-virus
    • Anti-pop-up

    Answer :Anti-spyware

    When troubleshooting a software problem on Pheobe's computer and listening to her describe the problem, your beeper goes off. It's your boss. Which of the following is the most appropriate action for you to take?


    Options are :

    • Wait until Phoebe finishes her description, run through any simple fixes, and then explain that you need to call your boss on your cell phone.
    • Excuse yourself, walk out of the cube, and use a cell phone to call your boss.
    • Pick up Phoebe's phone and dial your boss's number.
    • Wait until Phoebe finishes her description, and then ask to use her phone to call your boss.

    Answer :Wait until Phoebe finishes her description, run through any simple fixes, and then explain that you need to call your boss on your cell phone.

    CompTIA JK0-022 Security Cryptography Certification Exam Set 7

    You want to install Windows 7 32-bit onto your computer. What is the bare minimum amount of hard drive space required to do this?


    Options are :

    • 20 GB
    • 12 GB
    • 8 GB
    • 16 GB

    Answer :16 GB

    What protocol must be enabled to configure a new workstation to boot an operating system from a network?


    Options are :

    • UPNP
    • WOL
    • PXE
    • WiFi

    Answer :PXE

    A user reports that their PC boots up to a screen that reads "OS not found." Which of the following would be the most likely cause of this problem?


    Options are :

    • Not enough memory is available.
    • The system has a BSOD.
    • The user has a USB key attached.
    • There are conflicting operating systems.

    Answer :The user has a USB key attached.

    CompTIA JK0-801 A Laptop Printer and Operating certify Exam Set 6

    The on-site technician at ABC Corp. is working on repairing a user's computer. The user claims he is having trouble accessing the R drive. As part of her diagnostics, the tech runs IPCONFIG and notes that the IP address is 10.23.139.19. In the middle of the diagnostics, the user needs to leave. To continue working easily, the technician asks for the user's password.   

    After working on it for another 30 minutes, the technician determines the problem to be a server permissions issue. By the time the user returns, she has called the technician in charge of the server and had the problem corrected. She shows the user that everything now works correctly and returns to her office to file the paperwork. 

    What did the technician do wrong?


    Options are :

    • She asked the user to reveal his password.
    • She did not follow the CompTIA troubleshooting method.
    • She did not have the user fill out the proper forms.
    • She took too long to diagnose the problem.

    Answer :She asked the user to reveal his password.

    Uhura has just accepted an SSL certificate, but she's not comfortable about the source and now wishes to make it "go away." What should she do?


    Options are :

    • Configure her firewall to block all incoming SSL certificates
    • Right-click on the certificate in question and select "Confirm"
    • Clear the SSL cache
    • Rebuild her SSL cache

    Answer :Clear the SSL cache

    William's system is locking up during Windows boot. He reboots and presses F8 to bring up the boot menu and then selects "enable boot logging" In what file will the results be stored?


    Options are :

    • ntbtlog.txt
    • winlog.txt
    • logfile.txt
    • winntlog.txt

    Answer :ntbtlog.txt

    220-802 CompTIA A+ Certification Practice Exam Set 8

    Which of the following is best used to prevent other people from viewing a user's computer screen?


    Options are :

    • Key fob
    • Anit-virus software
    • Privacy filter
    • Biometric device

    Answer :Privacy filter

    A technician wants to configure the computer to send an alert when the CPU usage is above 95% for an arbitrary length of time. Which utility should be used?


    Options are :

    • TLIST
    • Performance Monitor
    • Task Manager
    • REGSRV32

    Answer :Performance Monitor

    Which of the following are good ESD protection measures?


    Options are :

    • Wear leather gloves.
    • Wear sneakers when working on PCs.
    • Touch the power supply occasionally.
    • Only touch the PC with one hand.

    Answer :Touch the power supply occasionally.

    CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 1

    Ivan sees a coworker's printer sitting precariously on the edge of a table. The coworker is not around. He should:


    Options are :

    • Tell the user to move the printer.
    • Send an email to the building supervisor.
    • Move the printer back safely on the table.
    • Call their supervisor.

    Answer :Move the printer back safely on the table.

    Joe has a firewall and up-to-date antivirus software on his company computer. He has asked what else he can do to improve his security. Which of the following will have the most impact on network security? (Select two.)


    Options are :

    • Disable screen savers
    • Conduct a daily security audit
    • Install additional antivirus software
    • Assign security rights based on job roles
    • Use strong passwords

    Answer :Assign security rights based on job roles Use strong passwords

    Harriet needs to move an 85-pound laser printer off of a table to get to a UPS. She should:


    Options are :

    • Call her supervisor.
    • Get help to move it.
    • Lift with her knees.
    • Use a hand truck.

    Answer :Get help to move it.

    CompTIA JK0-022 Security Cryptography Certification Exam Set 7

    Which of the following commands may be used on a computer, running Windows 7, to stop a single process from the command line?


    Options are :

    • DEL
    • ERASE
    • TASKKILL
    • SHUTDOWN

    Answer :TASKKILL

    Which of the following is most commonly a local security policy?


    Options are :

    • Password length
    • Soft Power
    • RAID
    • Use a password to log in

    Answer :Password length

    What does the Windows feature "Sticky Keys" do for users?


    Options are :

    • Tells the computer to ignore quick or repeated keystrokes
    • Lets you press key combinations such as (Windows Key+Tab) one key at a time.
    • Locks down the function key to Enable mode
    • Plays a tone when you press Caps Lock, Num Lock, or Scroll Lock.

    Answer :Lets you press key combinations such as (Windows Key+Tab) one key at a time.

    CompTIA N10-004 Network+ Certification Practice Test Set 9

    You are a technician working for a large company, and you notice a user has left a Post-it note attached to her monitor of a new password that she was just given. What should the technician do?


    Options are :

    • Log in with it and change her password to teach her a lesson.
    • Inform their supervisor.
    • Explain to her how dangerous it is to leave passwords lying around.
    • Take it and give it to her when she gets back from lunch.

    Answer :Inform their supervisor.

    A full backup is made at the beginning of the week. Which of the following backup methods would be the quickest and smallest if used each day during that week?


    Options are :

    • Incremental
    • Differential
    • Copy
    • Normal

    Answer :Incremental

    Glenda plugs in her new scanner only to have it emit a bright flash, a popping noise, and a wisp of smoke. It stops functioning. She unplugs the scanner. What should she do now?


    Options are :

    • Try a scanner reset.
    • Verify the illumination light is not broken.
    • Try plugging it back in.
    • Return the scanner to the place of purchase.

    Answer :Return the scanner to the place of purchase.

    SK0-004 CompTIA Server+ Certification Practice Exam Set 8

    Where is the system tray located in Windows?


    Options are :

    • On the far right end of the Taskbar
    • In the System Tools folder
    • In the System folder located in Control Panel
    • None of the above

    Answer :On the far right end of the Taskbar

    In Windows, where can you update a network card driver?


    Options are :

    • BOOTMGR
    • Device Manager
    • Performance Logs and Alerts
    • Task Manager

    Answer :Device Manager

    Which of the following is a new feature of iOS 5?


    Options are :

    • Ability to run native PC applications
    • Ability to dual boot the Android OS
    • Ability to perform untethered updates
    • Ability to perform iTunes backups

    Answer :Ability to perform untethered updates

    CLO-001 CompTIA Cloud Essentials Certification Practice Test Set 2

    Which of the following types of hardware is least likely to be used as a security device?


    Options are :

    • Biometric thumbprint reader
    • SD flash card
    • Key fob
    • Smart card

    Answer :SD flash card

    Aaron wants to encrypt his hard drive on his Windows 10 Home system. What options does he have?


    Options are :

    • Third-party encryption tool
    • WPA
    • NTFS
    • BitLocker

    Answer :Third-party encryption tool

    What contains utilities to safely and easily modify the configuration of just about every setting in Windows?


    Options are :

    • Control Panel
    • Registry Editor
    • SCANDISK.EXE
    • SYSEDIT.EXE

    Answer :Control Panel

    CompTIA CySA+ Set 2

    A user's computer keeps producing a "low virtual memory" alert, after which the speed of the system degrades. Which of the following Control Panel applets can provide information to review and correct this issue?


    Options are :

    • System > Remote
    • System > Hardware
    • System > System Restore
    • System > Advanced

    Answer :System > Advanced

    The technology of using the Internet to securely connect a computer to a private network is known as:


    Options are :

    • VNN
    • VTN
    • VLN
    • VPN

    Answer :VPN

    What is "phishing?"


    Options are :

    • Pretending to be a trustworthy source over the Internet to get usernames and passwords
    • Infiltrating an organization so that you can do a job and get a paycheck every two weeks
    • Dumpster diving for usernames and passwords
    • Hacking into unsecured wireless networks to access usernames and passwords

    Answer :Pretending to be a trustworthy source over the Internet to get usernames and passwords

    220-902 CompTIA A+ Certification Practice Exam Set 7

    Tom installs a Telnet application on his Windows Vista system. When he first starts the program, Windows Firewall pops up with a message telling him the Telnet application is trying to access the Internet. If he clicks on the Allow button, what has he created?


    Options are :

    • Exception
    • Port Forward
    • ACL
    • UAC

    Answer :Exception

    When setting up a new wireless router, which of the following actions should the technician take first, to secure the network? (Select two.)


    Options are :

    • Change the SSID
    • Enable MAC filtering
    • Position the antennas to prevent outside access
    • Disable unused ports
    • Change the default user name

    Answer :Change the SSID Change the default user name

    One of the best ways to identify an infected machine is to:


    Options are :

    • Watch for unusual behavior
    • Run Ipconfig /antivirus
    • Scan the hard drive for bad sectors
    • Have it tested annually

    Answer :Watch for unusual behavior

    CompTIA JK0-801 A+ Certification Practical Exam Set 4

    The term "Patch Management" refers to:


    Options are :

    • The process of ensuring an operating system has all up-to-date updates.
    • Properly configuring the Windows Update utility.
    • The process of distributing and organizing Flash ROM updates to system BIOS.
    • The process of organizing all of a computer's patches by different criteria.

    Answer :The process of ensuring an operating system has all up-to-date updates.

    When Eddie first walks into an onsite job, he should:


    Options are :

    • Introduce himself and review the customer's safety rules.
    • Immediately start to repair the problem.
    • Have a meeting with all of the managers to introduce himself.
    • Introduce himself and ask the customer if they are ready for him to start working.

    Answer :Introduce himself and ask the customer if they are ready for him to start working.

    Which of these are symptoms of malware on a PC? (Select two.)


    Options are :

    • When you browse the Internet, you are redirected to Web sites that you didn't click on.
    • When your computer prints, it prints nothing but random character and symbols instead of regular text.
    • When your PC is sitting idle, you notice the network and hard drive activity is higher than normal.
    • Your computer's display has a residual ghosted image on it.
    • The optical drive in your computer ejects at random times.

    Answer :When you browse the Internet, you are redirected to Web sites that you didn't click on. When your PC is sitting idle, you notice the network and hard drive activity is higher than normal.

    CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 29

    You work for a company that does network cable installations. Your company has been contracted to pull out the existing CAT 3 wiring to install CAT 6. You notice the plug on the end of the CAT 3 is an RJ-45. What is the other connector type that can be used with CAT 3 installations?


    Options are :

    • RJ-11
    • LC
    • SC
    • BNC

    Answer :RJ-11

    When working on a user's computer Jamie the tech notices, that the user has created several desktop shortcuts to inappropriate websites. What should Jamie do?


    Options are :

    • Preserve the data and device
    • Document all changes to the computer
    • Track the evidence
    • Report through proper channels

    Answer :Report through proper channels

    Standard Windows NTFS permissions for a folder are: full control, modify, read & execute, list folder contents, ______, and _______. (Select two.)


    Options are :

    • export
    • read
    • delete
    • write

    Answer :read write

    CD0-001 CDIA+ Certification Practice Exam Set 12

    What is Remote Assistance?


    Options are :

    • A feature that connects your PC to a live IRC chat session with a Microsoft help desk technician.
    • A feature that enables a tech to access a user's PC remotely to perform diagnostics and initiate repairs.
    • A toll-free number that connects immediately with Microsoft support staff.
    • An extended warranty program offered by Microsoft.

    Answer :A feature that enables a tech to access a user's PC remotely to perform diagnostics and initiate repairs.

    Which is the correct type of fire extinguisher for electrical fires?


    Options are :

    • Class B
    • Class A
    • Water-based fire extinguisher
    • Class C non-water based extinguisher

    Answer :Class C non-water based extinguisher

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions