Exam 2: CompTIA A+ Certification Exam: Core 2
Exam 1: CompTIA A+ Certification Exam: Core 1471 Questions
Exam 2: CompTIA A+ Certification Exam: Core 2409 Questions
Exam 3: CompTIA Advanced Security Practitioner (CASP+) CAS-003442 Questions
Exam 4: CompTIA Advanced Security Practitioner (CASP+) CAS-004107 Questions
Exam 5: CompTIA Cloud Essentials+165 Questions
Exam 6: CompTIA CySA+ Certification Exam (CS0-002)294 Questions
Exam 7: CompTIA Cloud+ (CV0-002)48 Questions
Exam 8: CompTIA Cloud+67 Questions
Exam 9: CompTIA IT Fundamentals387 Questions
Exam 10: CompTIA Network+829 Questions
Exam 11: CompTIA Project+540 Questions
Exam 12: CompTIA PenTest+ Certification Exam165 Questions
Exam 13: CompTIA Server+66 Questions
Exam 14: CompTIA Server+ Certification Exam779 Questions
Exam 15: CompTIA Security+1 k+ Questions
Exam 16: CompTIA Security+ 2021129 Questions
Exam 17: CompTIA CTT+ Essentials378 Questions
Exam 18: CompTIA Linux+252 Questions
Select questions type
A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring. Which of the following would BEST accomplish this goal?
(Multiple Choice)
4.8/5
(33)
A user installed an application that now requires a license key to enable full functionality. The user contacts support, and the technician decides to enter a license key in the software GUI on behalf of the user. Which of the following will support this task?
(Multiple Choice)
4.8/5
(36)
A technician has been asked to recommend antivirus software for a home PC, but the user does not want to pay for a license. Which of the following license type should the technician recommend?
(Multiple Choice)
5.0/5
(30)
A user reports that a cell phone application is loading slowly and not functioning properly. Which of the following should a technician do FIRST to remedy this issue?
(Multiple Choice)
4.9/5
(34)
A network technician is creating a set of scripts to help complete some common tasks. The technician wants to leave notes within the scripts to explain the purpose of each section and allow for changes later. Which of the following should the technician use?
(Multiple Choice)
4.9/5
(36)
A user's smartphone is experiencing limited bandwidth when at home. The user reports to a technician that the device functions properly when at work or in the car. Which of the following troubleshooting steps should the technician take NEXT?
(Multiple Choice)
4.8/5
(40)
After a virus outbreak due to USB usage, a technician must deny users access to removable hard drives via USB ports as soon as possible. The technician has been asked to avoid interrupting any users. Which of the following is the BEST way for the technician to perform this security feature?
(Multiple Choice)
4.8/5
(33)
Which of the following BEST describes the Guest account on a Windows system?
(Multiple Choice)
4.9/5
(32)
A user updated an iOS smartphone and is now having issues connecting to the Internet. The phone shows 1x for signal strength while making calls. Which of the following are the MOST likely causes of these issues? (Choose two.)
(Multiple Choice)
4.9/5
(30)
Which of the following encryption methods is used by WPA2 to improve data security as compared to previous wireless encryption protocols?
(Multiple Choice)
4.7/5
(37)
A Linux user reports that an application will not open and gives the error. Only one instance of the application may run at one time. A root administrator logs on to the device and opens a terminal. Which of the following pairs of tools will be needed to ensure no other instances of the software are currently running?
(Multiple Choice)
4.8/5
(37)
Which of the following filesystem types has native read/write support on all desktop operating systems?
(Multiple Choice)
4.7/5
(34)
A Mac user's operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC. Which of the following built-in utilities should be used?
(Multiple Choice)
4.9/5
(28)
Which of the following can be applied directly to an organizational unit in Active Directory to provide security to both the user and the machine?
(Multiple Choice)
4.8/5
(28)
Joe, an end user, has been prompted to provide his username and password to access the payroll system. Which of the following authentication methods is being requested?
(Multiple Choice)
4.7/5
(30)
A SOHO technician recently moved some data from one server to another to increase storage capacity. Several users are now reporting they cannot access certain shares on the network. When the users attempt to access the shares, they get the following error: Access Denied. The technician confirms the users are all in the proper security groups and have the proper access, but they are still unable to access the shares. Which of the following are the MOST likely reasons for these issues? (Choose two.)
(Multiple Choice)
4.8/5
(37)
A technician recently updated a printer driver on all the computers in an office. Shortly after the update, several users' accounts and passwords were compromised. Which of the following MOST likely explains the compromised accounts?
(Multiple Choice)
4.8/5
(31)
Which of the following Windows OS technologies is used to store remote data accessed via a WAN connection on local servers for user access?
(Multiple Choice)
4.9/5
(32)
A user's login screen does not look normal when booting the computer. A technician states the computer was showing the company's workstation imaging system screen, but it has since been fixed. Which of the following did the technician update?
(Multiple Choice)
4.8/5
(31)
Which of the following should be replaced after a voltage spike?
(Multiple Choice)
5.0/5
(33)
Showing 121 - 140 of 409
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)