CompTIA Security+ Question K-92

A system administrator attempts to ping a hostname and the response is 2001:4860:0:2001::68.
Which of the following replies has the administrator received?

A. The loopback address
B. The local MAC address
C. IPv4 address
D. IPv6 address

Answer: D

IPv6 addresses are 128-bits in length. An IPv6 address is represented as eight groups of four hexadecimal digits, each group representing 16 bits (two octets). The groups are separated by colons (:). The hexadecimal digits are case-insensitive, but IETF recommendations suggest the use of lower case letters. The full representation of eight 4-digit groups may be simplified by several techniques, eliminating parts of the representation.

CompTIA Security+ Question K-57

The information security team does a presentation on social media and advises the participants not to provide too much personal information on social media web sites. This advice would BEST protect people from which of the following?

A. Rainbow tables attacks
B. Brute force attacks
C. Birthday attacks
D. Cognitive passwords attacks

Answer: D

Social Networking Dangers are ‘amplified’ in that social media networks are designed to mass distribute personal messages. If an employee reveals too much personal information it would be easy for miscreants to use the messages containing the personal information to work out possible passwords.

CompTIA Security+ Question G-25

Emily, a security technician, has received notice that a vendor coming in for a presentation will require access to a server outside of the network. Currently, users are only able to access remote sites through a VPN connection. How could Emily BEST accommodate the vendor?

A. Allow incoming IPSec traffic into the vendor’s IP address.
B. Set up a VPN account for the vendor, allowing access to the remote site.
C. Turn off the firewall while the vendor is in the office, allowing access to the remote site.
D. Write a firewall rule to allow the vendor to have access to the remote site.

Answer: D

Firewall rules are used to define what traffic is able pass between the firewall and the internal network. Firewall rules block the connection, allow the connection, or allow the connection only if it is secured. Firewall rules can be applied to inbound traffic or outbound traffic and any type of network.

CompTIA Network+ Question A-28

A network technician is troubleshooting a network connection error, when pinging the default gateway no reply is received. The default gateway is found to be functioning properly but cannot connect to any workstations. At which of the following OSI layers could the problem exist? (Select TWO)

A. Presentation
B. Transport
C. Session
D. Data link
E. Application
F. Physical

Correct Answer: DF

CompTIA A+ 220-902 Question G-86

Multiple users have reported that there are black dots on the conference room LCD when doing presentations. Which of the following is MOST likely the problem?

A. The video card displaying to the LCD is incompatible.
B. The LCD has dead pixels.
C. The LCD needs to be recalibrated.
D. The conference room PC is overheating.

Correct Answer: B

CompTIA A+ 220-902 Question F-93

A user has a laptop that they need to get ready for an outdoor presentation. The user is concerned that the laptop will turn off the screen or go into standby before their presentation is complete. Which of the following Control Panel paths should the technician use in order to prevent this from occurring?

A. System -> Hardware
B. Power Options -> Power Schemes
C. System -> Advanced -> Performance
D. Power Options -> Hibernate

CompTIA A+ Question J-68

Emily, a user, boots her laptop and notices the screen flashes then turns black. It was working during her presentation yesterday. Which of the following troubleshooting steps should be completed?

A. Use a multimeter to test voltage.
B. Replace the laptop with a new one.
C. Replace the battery.
D. Connect an external display device.

Correct Answer: D

CompTIA A+ Question I-75

During a presentation, a client removes confidential proposal materials from the presenter’s laptop via an IR connection. This behavior is expressly prohibited by the company. The client’s location in the audience is immediately identified. Which of the following should the technician do NEXT?

A. Track the evidence
B. Report to the proper channel
C. Identify the information compromised
D. Document the security breach

Correct Answer: B

Report this matter to your supervisor or manager. He can then escalate the problem to higher authorities and take proper action to mitigate or rectify this digital theft.

CompTIA A+ Question I-31

A new company is thinking of upgrading its media workstation in the conference room. The computer will be predominantly used for graphically intensive presentations, slideshows, and video gaming tournaments. Which of the following BEST satisfies the needs of the company?

A. High-end video, high-end audio, multicore processor
B. Minimum RAM required, network connectivity, high-end cooling
C. Media streaming, file sharing, gigabit NIC, dual monitors, TV tuner
D. Network connectivity, TV tuner, surround sound audio, dual monitors

Correct Answer: A

CompTIA A+ Question E-73

A user creates a file in presentation software to be shown on a widescreen display. The user would like to adjust the aspect ratio of the slides in the presentation software so they display without extra black areas on the top, bottom, left, or right of the slides. Which of the following aspect ratios would BEST meet this requirement?

A. 4:3
B. 5:4
C. 16:9
D. 256:135

Correct Answer: C