Exam 2: CompTIA A+ Certification Exam: Core 2
Exam 1: CompTIA A+ Certification Exam: Core 1471 Questions
Exam 2: CompTIA A+ Certification Exam: Core 2409 Questions
Exam 3: CompTIA Advanced Security Practitioner (CASP+) CAS-003442 Questions
Exam 4: CompTIA Advanced Security Practitioner (CASP+) CAS-004107 Questions
Exam 5: CompTIA Cloud Essentials+165 Questions
Exam 6: CompTIA CySA+ Certification Exam (CS0-002)294 Questions
Exam 7: CompTIA Cloud+ (CV0-002)48 Questions
Exam 8: CompTIA Cloud+67 Questions
Exam 9: CompTIA IT Fundamentals387 Questions
Exam 10: CompTIA Network+829 Questions
Exam 11: CompTIA Project+540 Questions
Exam 12: CompTIA PenTest+ Certification Exam165 Questions
Exam 13: CompTIA Server+66 Questions
Exam 14: CompTIA Server+ Certification Exam779 Questions
Exam 15: CompTIA Security+1 k+ Questions
Exam 16: CompTIA Security+ 2021129 Questions
Exam 17: CompTIA CTT+ Essentials378 Questions
Exam 18: CompTIA Linux+252 Questions
Select questions type
Joe, an employee, took a company-issues Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server. Joe has verified he is connected to the Internet. Which of the following would explain why Joe cannot access his personal shares?
(Multiple Choice)
4.8/5
(32)
A technician successfully removed malware from a user's computer, and recent scans do not report any infections. However, the computer has begun experiencing issues accessing websites with Internet Explorer after a few hours of use. Some remote websites return error messages, and other sites do not display properly. Which of the following options should the technician utilize NEXT to troubleshoot this issue?
(Multiple Choice)
4.9/5
(36)
After purchasing an Ultrabook, Ann, a home user, has a technician come to her home and install an operating system. Which of the following OS installation methods will the technician MOST likely use?
(Multiple Choice)
4.8/5
(39)
Which of the following should be enacted to reduce a company's liability and exposure to a potential lawsuit?
(Multiple Choice)
4.9/5
(34)
An administrator is investigating intermittent, slow performance of a web server. The administrator performs a virus scan on the server but finds there is no infection present. Which of the following should the administrator do NEXT to mitigate the issue?
(Multiple Choice)
4.9/5
(43)
A user is working on a shared computer and attempts to open the email application, which freezes when opened. A technician logs into the computer, and the email application works without issue. The technician has the user log back in, but the application still freezes when opened. Which of the following is the NEXT step the technician should take to resolve the issue?
(Multiple Choice)
4.8/5
(44)
A user's phone contains customer's PII. The user cannot have the phone automatically wiped because the data is very valuable. Which of the following is the BEST method of securing the phone?
(Multiple Choice)
4.8/5
(27)
A user notices recent print jobs are not printing to the local printer despite printing fine yesterday. There are no errors indicated on the taskbar printer icon. Which of the following actions should the user take FIRST?
(Multiple Choice)
4.9/5
(33)
A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have access to only the application needed for customer interaction. The technician must also ensure that whenever the computer is rebooted or powered on it logs in automatically without a password. Which of the following account types would the technician MOST likely set up on this kiosk machine?
(Multiple Choice)
5.0/5
(37)
Which of the following social engineering vulnerabilities occurs when someone follows a technician into a server room without using a key card?
(Multiple Choice)
4.8/5
(42)
Which of the following key and mouse combinations can be used to run an application as a different user?
(Multiple Choice)
4.9/5
(37)
A technician is creating a network topology diagram. Which of the following would be the MOST appropriate to include? (Choose two.)
(Multiple Choice)
4.8/5
(33)
A user browses to a company's intranet page and receives an invalid certificate message. A technician discovers the certificate has expired. A new certificate is put in place and installed on the user's computer; however, the user still receives the same message when going to the intranet page. The technician tries with a third-party browser and connects without error. The technician needs to make sure the old certificate is no longer used in Internet Explorer. Which of the following Internet Options should the technician use to ensure the old certificate is removed?
(Multiple Choice)
4.9/5
(25)
Joe, a customer, calls a technician to report a remote computer is demonstrating erratic behavior while he is working on it. The technician verifies the files and directories. Joe is working on locally cannot be opened in any application, and the computer is running extremely slow. Which of the following is the MOST likely cause of this issue?
(Multiple Choice)
4.9/5
(38)
Ann, a user, is attempting to log in to her email service form a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid. Ann then decides to reset her email password, but after the reset, the new credentials still do not work in the third-party email client. Which of the following settings or features is responsible for the problems Ann is experiencing?
(Multiple Choice)
4.8/5
(40)
A technician receives the Chief Executive Officer's (CEO's) Windows 10 laptop, which has been infected with malware. The technician wants to make sure best practices are followed for troubleshooting and remediating the malware. Which of the following best practices should the technician perform FIRST in this scenario? (Choose three.)
(Multiple Choice)
4.9/5
(26)
A technician performs a virus cleaning on a computer that has been redirecting all browsers to a phishing website. System Restore was turned off before the cleaning. The technician runs the machine through several scanners, and then tests for redirection. A smaller number of sites are still redirecting to the phishing website. The antivirus software correctly blocks the website. Which of the following should the technician do NEXT?
(Multiple Choice)
4.8/5
(33)
A user is surprised that a newly installed third-party smartphone application requires permissions to access the camera, location, and microphone. Unaware of a reason why permissions are needed for the application to function as advertised, the user contacts the help desk for assistance. Which of the following should the help desk team recommend the user do in this situation?
(Multiple Choice)
4.7/5
(44)
A company is upgrading the desktops of all its employees. Users in the multimedia department would like to keep the RAM from their current desktops to upgrade their new devices. Following change management best practices, which of the following actions should a technician perform NEXT?
(Multiple Choice)
4.9/5
(33)
Joe, a user, cannot read encrypted email messages on a corporate smartphone, but he has been able to read them in the past. A technician restarts Joe's smartphone, but the issue remains. The technician deletes the corporate email account and has Joe re-add it, verifying all settings are correct. Despite these steps, the issue persists. Which of the following is MOST likely causing the issue?
(Multiple Choice)
4.9/5
(38)
Showing 221 - 240 of 409
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)