Which of the following encryption methods is considered easily broken and should be avoided when configuring wireless security?
A. WEP
B. WPA
C. AES
D. TKIP
CompTIA exam questions
Which of the following encryption methods is considered easily broken and should be avoided when configuring wireless security?
A. WEP
B. WPA
C. AES
D. TKIP
Which of the following display types is MOST likely to have problems with light and glare?
A. Plasma
B. LED
C. OLED
D. LCD
A customer’s computer crashes consistently when a specific application is launched. The technician has looked at the computer and confirmed the cause of the crash. Which of the following is the NEXT troubleshooting step the technician should take?
A. Verify full system functionality.
B. Document the findings, actions, and outcomes.
C. Establish a plan of action to resolve the problem.
D. Question the user and identify changes the user has made to the system.
A technician is given a task of terminating a bundle of CAT5 cables that have not been labeled. Which of the following tools will be the BEST to perform this job task?
A. Crimper, multimeter
B. Crimper, cable tester, toner probe
C. Crimper, cable tester
D. Crimper, toner probe, multimeter
Which of the following would be included when documenting the MOST recent policy on corporate behavior?
A. Page numbers
B. Author of the document
C. A complete table of contents
D. Last revision dates and version numbers
Which of the following features can be configured with keyboards to assist users with disabilities?
A. Pointer trails
B. Magnifier
C. Sticky keys
D. Character map
Which of the following types of connectors can use a maximum of 8 strands of wires?
A. RJ-11
B. RS-232
C. RJ-45
D. BNC
When installing multiple SCSI drives in a system, which of the following is correct?
A. All drives must have the same SCSI ID.
B. Drives will be automatically assigned an ID by the controller.
C. Drives in the same RAID array must have the same SCSI ID.
D. Each drive must have a different SCSI ID.
DNS on a client computer provides which of the following functions?
A. Communicate with a remote server for user login validation
B. Communicate internally with cached tables for address assignment
C. Communicate with a remote server for address assignment
D. Communicate with a remote server for address resolution
Which of the following communication standards requires line-of-site with no obstacles in order to operate properly?
A. Bluetooth
B. IR
C. RF
D. WiFi