A user is reporting that they are clicking on search results and being redirected to the wrong sites. Which of the following should a technician check FIRST?
A. Temporary Internet Files
B. Proxy Settings
C. Cookies
D. Windows Firewall
CompTIA exam questions
A user is reporting that they are clicking on search results and being redirected to the wrong sites. Which of the following should a technician check FIRST?
A. Temporary Internet Files
B. Proxy Settings
C. Cookies
D. Windows Firewall
Which of the following is a business use case for desktop virtualization? (Select TWO).
A. Circumvent software licensing
B. Disaster Recovery
C. Security Monitoring
D. Software Testing
E. Increased Storage Space
Which of the following is the difference between a quick and a full format?
A. Quick format does not check for bad sectors while full format does.
B. Full format prompts for confirmation while quick format does not.
C. Full format erases all partitions on the disk at once while quick format only erases one partition at a time.
D. Quick format only erases the system partition and not the data partition.
Which of the following statements is true about XP mode in Windows 7?
A. Windows XP mode was only available in Windows Vista and it is not available in Windows 7.
B. Only the Professional and the Ultimate versions support Windows XP mode.
C. All versions of Windows 7 support Windows XP mode when the feature is installed.
D. Only the Ultimate version of Windows 7 supports Windows XP mode.
A users PC breaks and a technician needs to configure a new machine with a copy of their computer image stored on a remote server. Which of the following technologies would help RIS install this image?
A. BRD
B. DVD
C. USB
D. PXE
E. CD
Peter, a client, wants to allow only specific portable devices to connect to his wireless network. Which of the following methods would BEST accomplish this?
A. Disabling SSID broadcast
B. MAC filtering
C. Lower radio power levels
D. Directional antennas
Which of the following System Tools would be the BEST one to perform a regular archiving of information on a PC?
A. ROBOCOPY
B. XCOPY
C. Backup
D. System Restore
A user, Peter, calls and states every few hours he is unable to connect to the Internet for several minutes but is able to access internal sites during this time. Which of the following tools would be used to find the issue with the network connection?
A. TRACERT
B. NETSTAT
C. IPCONFIG
D. NSLOOKUP
A user, Jane, receives a call from Peter who states that he is brand new in the help desk. Peter states that he needs to update Janes email client to prevent corruption. At Peter’s request, Jane discloses her user name and password. She later discovers that Peter is not a member of the help desk. Which of the following has occurred?
A. Social engineering
B. Phishing
C. Spear phishing
D. Hijacking
A technician is setting up a wired SOHO network for a client. The client would like to ensure that unauthorized PCs are not easily able to communicate on the network. Which of the following can the technician do?
A. Enable MAC filtering
B. Encrypt passwords
C. Disable SSID
D. Disable DHCP