Which of the following are examples of digital security? (Select TWO).
A. Strong password
B. Privacy screen
C. Badge
D. MAC filtering
E. Mantrap
CompTIA exam questions
Which of the following are examples of digital security? (Select TWO).
A. Strong password
B. Privacy screen
C. Badge
D. MAC filtering
E. Mantrap
When issuing user permissions for job functions, an administrator should assign:
A. Permissions based on employees role.
B. Them to the Power User role on the machine.
C. Permissions based on employees seniority.
D. Them to the Administrator role on the machine.
Which of the following PING switches would be used to continue a ping to a host until stopped?
A. -r
B. -a
C. -t
D. -l
A user reports that their PC will not boot after multiple attempts. Which of the following should be the technicians FIRST response?
A. “Are you able to log in?”
B. “Do you see lights on the PC?”
C. “Do you hear a clicking sound?”
D. “Is the PC plugged in?”
When installing Windows on a new server, a technician gets an error reporting that no suitable hard drives are available for installation. Which of the following is MOST likely the issue?
A. Bluetooth pairing is disabled
B. RAID drivers need loading
C. PXE boot server unavailable
D. CMOS battery needs replaced
Which of the following should a technician do LAST after cleaning up a virus infection?
A. Enable system restore and create restore point
B. Update antivirus software
C. Schedule scans and updates
D. Educate the end user
A technician has discovered that there is an issue with the configuration of DirectX. Which of the following utilities would allow the technician to resolve this issue?
A. MSINFO32
B. DXDIAG
C. REGEDIT
D. MSCONFIG
Which of the following security threats do shredders help prevent?
A. Dumpster diving
B. Malware
C. Phishing
D. Worms
At the airport the company sales employees work on their laptops to submit financial proposals. Which of the following would mitigate shoulder surfing?
A. Firewalls
B. The use of VPNs
C. Privacy filters
D. RSA key fobs
A technician has a computer locked in a cabinet in the office that shares a printer and some files. The computer must remain on. Which of the following Control Panel options would be used to control the users that are able to shut the computer down?
A. Power options
B. Security center
C. Local security policy
D. System