Exam 2: CompTIA A+ Certification Exam: Core 2
Exam 1: CompTIA A+ Certification Exam: Core 1471 Questions
Exam 2: CompTIA A+ Certification Exam: Core 2409 Questions
Exam 3: CompTIA Advanced Security Practitioner (CASP+) CAS-003442 Questions
Exam 4: CompTIA Advanced Security Practitioner (CASP+) CAS-004107 Questions
Exam 5: CompTIA Cloud Essentials+165 Questions
Exam 6: CompTIA CySA+ Certification Exam (CS0-002)294 Questions
Exam 7: CompTIA Cloud+ (CV0-002)48 Questions
Exam 8: CompTIA Cloud+67 Questions
Exam 9: CompTIA IT Fundamentals387 Questions
Exam 10: CompTIA Network+829 Questions
Exam 11: CompTIA Project+540 Questions
Exam 12: CompTIA PenTest+ Certification Exam165 Questions
Exam 13: CompTIA Server+66 Questions
Exam 14: CompTIA Server+ Certification Exam779 Questions
Exam 15: CompTIA Security+1 k+ Questions
Exam 16: CompTIA Security+ 2021129 Questions
Exam 17: CompTIA CTT+ Essentials378 Questions
Exam 18: CompTIA Linux+252 Questions
Select questions type
A technician needs to view hidden files. Which of the following Control Panel utilities would be used for this purpose?
(Multiple Choice)
4.7/5
(44)
A technician is setting up a SOHO wireless router and needs to adhere to the following requirements: • The router should not assign network addresses to any device. • All devices in the office must be able to access network resources and the Internet. Which of the following should the technician perform to meet these requirements?
(Multiple Choice)
4.8/5
(23)
A technician logs on to a Linux computer and runs the following command: ps -aux | grep vi Which of the following MOST accurately describes the effect of the command?
(Multiple Choice)
4.9/5
(41)
Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?
(Multiple Choice)
4.8/5
(39)
A technician is installing the latest OS on a user's system. The user wants all of the settings and files to remain intact during the installation. Which of the following upgrade methods should the technician use?
(Multiple Choice)
4.8/5
(37)
A technician is able to connect to a website; however, the technician receives the following error when attempting to access a different website: Page cannot be displayed . Which of the following command line tools would be BEST to identify the root cause of the connection problem?
(Multiple Choice)
4.9/5
(38)
A new company policy states that all end-user access to network resources will be controlled based on the users' roles and responsibilities within the organization. Which of the following security concepts has the company just enabled?
(Multiple Choice)
4.9/5
(29)
A technician is troubleshooting a printer issue on a Windows computer and wants to disable the printer to test a theory. Which of the following should the technician use to accomplish this?
(Multiple Choice)
4.8/5
(47)
A desktop technician is responsible for the OS migration of 300 end users. As part of the migration, the technician must save the end users' data to a temporary shared drive. The data must include any hidden files to ensure 100% of the data is retained. Which of the following commands will achieve this result by default?
(Multiple Choice)
4.7/5
(33)
Many of the files in a user's network folder have a new file extension and are inaccessible. After some troubleshooting, a technician discovers a text document that states the files were intentionally encrypted, and a large sum of money is required to decrypt them. Which of the following should the technician do to recover the files?
(Multiple Choice)
4.9/5
(32)
A corporate fileshare holds files for multiple departments. Individual users in each department create reports that are meant to be read by the rest of the company. Recently, a user ran a malicious executable that encrypted all of the documents on the fileshare. The software asked for money to be transferred via cryptocurrency in order to decrypt the files; however, the files were not decrypted after the company paid the ransom. Which of the following would MOST likely minimize the damage to a fileshare in this type of situation?
(Multiple Choice)
4.8/5
(42)
A network support technician takes a call from an office manager who wants to change the wireless security key on the access point in that particular office. The office manager explains that a label on the access point indicates it has an IP address of 10.0.100.2. Which of the following should the technician use to connect securely to the access point to make the change?
(Multiple Choice)
4.8/5
(25)
A technician encounters a previously unidentified issue. The technician conducts some research, finds a solution, and resolves the issue. According to best practices, which of the following should the technician do so the issue can be addressed if it is encountered again?
(Multiple Choice)
4.9/5
(41)
A network administrator audited applications on a user's desktop and noticed a program used to sync a mobile device to the desktop's calendar. To ensure corporate data is not exchanged to cloud servers, which of the following mobile security methods should be implemented?
(Multiple Choice)
4.8/5
(47)
Which of the following technologies can be utilized in a wireless network environment to provide secure SSO access for WiFi and network resources?
(Multiple Choice)
4.8/5
(44)
Ann, a user, calls the help desk regarding an issue on her laptop. While working remotely, she appears to be connecting to WiFi but is unable to retrieve her corporate email. The wireless name is listed as "ConnectMe" and appears as unsecure. Which of the following should the help desk perform to fix the issue?
(Multiple Choice)
4.8/5
(36)
Corporate management is concerned about the security of the company's mobile phones, in the event they are lost or stolen. Management instructs the IT staff to ensure the data on the devices is not accessible by unauthorized users. Which of the following would provide the BEST level of protection in this scenario? (Choose two.)
(Multiple Choice)
4.8/5
(39)
A small office's wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network. Which of the following configurations MOST likely allowed the attack to take place? (Select two.)
(Multiple Choice)
4.8/5
(32)
A technician is restoring files, which were deleted more than one month ago, from a backup on Mac OS X. Using the available GUI utility, which of the following utilities should the technician launch to accomplish this task?
(Multiple Choice)
4.8/5
(40)
Which of the following is MOST likely to be specified as a system requirement for the installation of a photo editing application in Microsoft Windows?
(Multiple Choice)
4.9/5
(38)
Showing 241 - 260 of 409
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)