A technician is creating a batch script that auto-assigns a particular drive share to a drive letter upon login. Which of the following commands can accomplish this?
A. NET USE
B. PING
C. XCOPY
D. IPCONFIG
CompTIA exam questions
A technician is creating a batch script that auto-assigns a particular drive share to a drive letter upon login. Which of the following commands can accomplish this?
A. NET USE
B. PING
C. XCOPY
D. IPCONFIG
Which of the following are examples of physical security? (Select TWO).
A. Badges
B. Anti-virus
C. Encryption
D. Firewalls
E. Locked doors
A user is reporting their web browser is not going to the site they are attempting to access. Which of the following would BEST resolve this?
A. Delete all Internet cookies.
B. Ensure the user is not utilizing a proxy server.
C. Remove all Internet shortcuts.
D. Clear all Internet cache and saved passwords.
A technician is working on an issue and has identified the problem and worked out the cause. Which of the following would MOST likely be the NEXT step the technician should make?
A. Document the cause and solution
B. Inform the user
C. Report to the supervisor
D. Establish a plan of action
A user has moved into a building and is installing a new wired network. There is existing cabling throughout the building. The user would like to prevent hardware that they do not own from connecting to the network. Which of the following actions would BEST prevent outside users from connecting?
A. Enable static IPs
B. Disable DNS
C. Disable local proxy server
D. Enable MAC filtering
A technician is tasked with resolving a display issue with a laptop. The technician has determined that the laptops display needs to be replaced. Which of the following is the NEXT step the technician should perform?
A. Identify the problem that caused the display to fail.
B. Establish a theory of the probable cause.
C. Verify full system functionality and implement preventive measures.
D. Establish an action plan to resolve the problem.
Which of the following is the command line entry to start an archive or restore a process on a Windows XP computer?
A. RECOVER
B. REPLACE
C. NTBACKUP
D. COPY
A company recently had a security breach and is now required to increase the security on their workstations. A technician has been tasked to harden all the workstations on the network. Which of the following should the technician do?
A. Enable Windows automatic updates
B. Enable screensaver required passwords
C. Enable MAC filtering
D. Enable wireless encryption
Jane, a home user, brings a PC in for repair and reports that performance has become extremely slow when working on documents and viewing pictures. Which of the following suggestions should a technician make?
A. Upgrade to a solid state drive
B. Increase the clock speed on the CPU
C. Run the file system check tool
D. Upgrade to a high performance video card
Which of the following is the MAIN difference between a rootkit and a virus?
A. Rootkits encrypt the operating system while viruses encrypt documents
B. Rootkits execute as super user while viruses execute as regular users
C. Rootkits modify the BIOS while viruses cannot access the BIOS
D. Rootkits infiltrate the kernel while viruses infiltrate files