CompTIA practice test 80% wrong questions
Which of the following IP addresses are Class C addresses? (Select three.) 189.189.5.2 125.166.11.0 223.16.5.0 192.15.5.55 240.0.0.0 222.55.0.0
222.55.0.0 192.15.5.55 223.16.5.0
A user works primarily in your organization's production area. However, she frequently needs to access data stored on the Windows 11 desktop system in her office while on the production floor. She would like to be able to use a Remote Desktop connection in the production area to remotely access her desktop system over the network. Which desktop user groups could you make her user account a member of in order to enable this Remote Desktop connection? (Select two.) Guests Administrators Power Users Users Remote Desktop Users
Administrators Remote Desktop Users
Which of the following are the FIRST settings you should check if you suspect that a malware attack has impacted your internet connection? (Select two.) Internet Connection Sharing settings DNS settings Proxy settings VPN settings BIOS settings
DNS settings Proxy settings
You have decided to use the Apple Remote Disc feature to share CDs and DVDs among employees on your company headquarters office network. Which of the following DVDs can you share with the employees using Remote Disc? Human Resource Blu-ray training videos Graphics editor installer Audio files from the latest company conference Financial application documentation
Financial application documentation
You are comparing methods for securing your mobile device. Which of the following is the BEST method to secure your device's storage? Full device encryption Locator applications Biometric authentication Remote backup applications
Full device encryption
Which of the following Windows Update options releases updates as soon as they are available to the public? Long-Term Servicing Channel General Availability Channel Windows Server Update Services Windows Insider Program
General Availability Channel
Which of the following door locks provides authentication to a specific lock over a Bluetooth connection? Smart card Biometric Standard lock Key fob
Key fob
Which of the following is true of online software activation? (Select three.) Enterprise licenses are usually inexpensive and can be used by most home or small business users. With personal software licenses, the limit is usually one to three online activations. Before running a newly installed application, the user must activate their license online on the software vendor's website. Since the license account information is stored online, it is usually not affected by operating system upgrades or migrations. Persistent activation may require the license to be continuously re-activated online at a preconfigured interval. The software vendor does not track how many times each license code is activated, but uses persistent activation to annually audit t
Persistent activation may require the license to be continuously re-activated online at a preconfigured interval. Before running a newly installed application, the user must activate their license online on the software vendor's website. With personal software licenses, the limit is usually one to three online activations.
You've just installed a new hardware device, upgraded the driver, and installed the custom software that came with the device. Now you can't get the device to work. Which of the following troubleshooting steps is the BEST to try first? Try installing the device on another system. Install the drivers that came on the installation CD. Run any diagnostic software that came with the device. Remove and then reinstall the device.
Run any diagnostic software that came with the device.
Which issue resolution status in a ticketing system indicates that an issue has been fixed and is awaiting customer acknowledgement? answer Open Solved Closed In-progress
Solved
Your company has a Windows software program that can only be used by one person at a time. When you try to run the program, you are shown a message that indicates that the program is in use and is not available. It is critical that you get access to this program as soon as possible. You would like to know who is currently logged on to the computer so you can find out who is using the program. You connect to the remote computer using a remote desktop connection. Which of the following is the BEST utility to use to find out who is using the program? usmt Device Manager Task Manager msconfig System Information
Task Manager
The Hide Programs setting is configured for a specific user as follows: After logging in, the user is able to see the Programs and Features option. Why did this happen? The Local Group Policy is applied last. It is set to Enabled, which makes the Programs and Features option visible. The GPO linked to the user's organizational unit is applied last, so this setting takes precedence. The GPO linked to the user's organizational unit is applied first, so this setting takes precedence over settings that are applied later. The Default Domain GPO is applied last. It is set to Not configured, so it doesn't change the configuration.
The GPO linked to the user's organizational unit is applied last, so this setting takes precedence.
You have a thin-provisioned storage space that suddenly unmounts. What is the MOST likely cause of this problem? The storage space has run out of disk space. One of the disks in the storage space pool has crashed. A new storage device has been added to the pool. The storage space has become corrupted.
The storage space has run out of disk space.
How many NTFS partitions does BitLocker require to operate? One Four Three Two
Two
You use a Linux distribution that uses RPM for package management. Which command would you use to display a list of all packages available for installation within the internet repositories configured on the system? apt-get list available ps -ef apt-get list yum show available yum list all ps -e yum show all yum list available
yum list available
You have been tasked with removing malware from an infected system. You have confirmed that there is an infection, and you continue running scans and removing the malware, but every time the system is rebooted, the malware comes back. Which of the following should you do to help prevent this from happening? Use a different anti-malware program Quarantine the system Disable Windows System Restore Boot into Safe Mode
Disable Windows System Restore
Which of the following disk maintenance utilities optimizes the performance of your hard drive by joining parts of files that are in different locations into a single location? Disk Management Disk Cleanup Disk Defragmenter Check Disk
Disk Defragmenter
You want to use hibernation on your Windows notebook. What does it need to have for this to work? 1 gigahertz (GHz) or faster processor Enough free hard disk space A minimum of 1 GB of RAM A UPS
Enough free hard disk space