Exam 2: CompTIA A+ Certification Exam: Core 2
Exam 1: CompTIA A+ Certification Exam: Core 1471 Questions
Exam 2: CompTIA A+ Certification Exam: Core 2409 Questions
Exam 3: CompTIA Advanced Security Practitioner (CASP+) CAS-003442 Questions
Exam 4: CompTIA Advanced Security Practitioner (CASP+) CAS-004107 Questions
Exam 5: CompTIA Cloud Essentials+165 Questions
Exam 6: CompTIA CySA+ Certification Exam (CS0-002)294 Questions
Exam 7: CompTIA Cloud+ (CV0-002)48 Questions
Exam 8: CompTIA Cloud+67 Questions
Exam 9: CompTIA IT Fundamentals387 Questions
Exam 10: CompTIA Network+829 Questions
Exam 11: CompTIA Project+540 Questions
Exam 12: CompTIA PenTest+ Certification Exam165 Questions
Exam 13: CompTIA Server+66 Questions
Exam 14: CompTIA Server+ Certification Exam779 Questions
Exam 15: CompTIA Security+1 k+ Questions
Exam 16: CompTIA Security+ 2021129 Questions
Exam 17: CompTIA CTT+ Essentials378 Questions
Exam 18: CompTIA Linux+252 Questions
Select questions type
Following an incident, an administrator is gathering forensic evidence from a server for a human resources investigation. Which of the following best practices is MOST important to document throughout the process to maintain integrity of the findings?
(Multiple Choice)
4.7/5
(30)
Which of the following threats uses personalized information in an attempt at obtaining information?
(Multiple Choice)
4.9/5
(43)
A technician is in the process of removing a recently discovered Trojan horse application from a user's laptop. Which of the following should the technician complete to prevent reinfection of the same machine?
(Multiple Choice)
4.9/5
(36)
A technician is called to troubleshoot a user's Windows workstation that fails to boot. The user reports that, after updating the workstation's graphics driver to a beta version, the machine gives a "Stop" error on every boot. Which of the following should the technician complete to resolve the issue?
(Multiple Choice)
4.8/5
(25)
Joe, a mobile device user, reached his monthly quota of data about halfway through the current billing cycle. Joe contacts a technician to identify potential issues with the mobile device, as his usage patterns have not changed over the past month. Which of the following is MOST likely causing this issue?
(Multiple Choice)
4.8/5
(38)
A technician needs to ensure users are prompted or warned when an installation takes place on a Windows system. Which of the following would meet this requirement?
(Multiple Choice)
4.8/5
(43)
A customer brings an old PC to a computer repair shop and asks for advice with regard to its repair or replacement. The PC has numerous errors during the boot process and is running a very outdated operating system. Which of the following should the technician do?
(Multiple Choice)
4.8/5
(33)
An office manager emails a technical support contractor about a new desktop for one of the workers. The office manager provides a specific configuration for the desktop. The technician notes the request will require the purchase of a new system. New system purchases are not in the scope of the support agreement. Which of the following should the technician do NEXT?
(Multiple Choice)
4.7/5
(40)
Ann, an external user, has received several calls from a company asking why she has been sending the company communications with internal users' names in the "from field". Ann calls a technician and explains she has not been sending any communications and would like this issue fixed. The technician investigates and determines the PC is not infected with any viruses or malware. Which of the following should the technician check NEXT?
(Multiple Choice)
4.8/5
(28)
A user is staying at a hotel that only offers Fast Ethernet connectivity to the network. The user's laptop is currently using the corporate network for access to network resources as well as the cloud. Which of the following should the help desk recommend performing prior to using the hotel network?
(Multiple Choice)
4.9/5
(37)
A user reports malware activity on an isolated workstation used for testing. It is running an end-of-life OS, and a USB drive is the only method used to transfer files. After removing the malware and replacing the USB drive with a brand new one, the technician gives the approval to use the equipment. The next day the user reports the same malware activity is present after powering on the system. Which of the following did the technician forget to do to prevent reinfection?
(Multiple Choice)
4.9/5
(52)
A SOHO user calls a technician and wants to secure a home network. The SOHO user needs to have protection from physical connections and ensure that employees cannot access applications or personal emails. Which of the following would the technician MOST likely configure on the new network device to accommodate this SOHO user's request? (Select TWO).
(Multiple Choice)
4.8/5
(34)
Joe, an end user, just changed his network password. A pop-up box appears a few minutes later, prompting him to enter his password. Joe enters his new network password and is able to continue working. A few minutes later, the same pop-up box appears again, asking him to enter his network password. Which of the following Control Panel utilities can Joe use to help with this situation?
(Multiple Choice)
4.8/5
(28)
An IT professional recently assisted Ann, a customer, with updating her password and regaining access to a hijacked email account. Shortly afterward, Ann notices dozens of unwanted emails, thanking her for subscribing to an organization's mailing list. Which of the following should be performed to remove and prevent any further emails from this organization?
(Multiple Choice)
4.8/5
(38)
The IT department has installed new software in the folder C:\Program Files\Business Application\. Ann, a user, runs the business application and tries to save her work. When doing so, Ann receives the following error: Cannot save file C: \Program Files\Business Application\file1.wrk - Access is denied. Which of the following would be the MOST secure solution to this error?
(Multiple Choice)
4.8/5
(35)
A technician is hardening a Windows workstation. One of the hardening requirements for the workstation is to prevent potential privilege escalation attacks on the local system. Which of the following steps should the technician perform to BEST meet this requirement?
(Multiple Choice)
4.8/5
(42)
A user's smartphone takes longer to access websites than it did prior to a weeklong vacation. The user also observes the smartphone no longer says LTE in the corner of the screen, but it has significant improvements in speed when connected to a local hotspot. Which of the following is the cause of the symptoms the smartphone is experiencing?
(Multiple Choice)
4.8/5
(37)
A user calls the help desk regarding a new Windows issue that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem. Which of the following would MOST likely fix the issue?
(Multiple Choice)
4.8/5
(26)
Which of the following installation methods will allow a technician to resolve issues that may arise while the installation is being performed?
(Multiple Choice)
4.8/5
(35)
A customer's computer is powered on and working, but the customer is unable to get to any wired network resources, shared drives, printers, or the Internet. Which of the following command-line tools should be used to troubleshoot this scenario?
(Multiple Choice)
4.9/5
(45)
Showing 81 - 100 of 409
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)