Time limit: 0
Quiz Summary
0 of 20 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Test complete. Results are being recorded.
Results
0 of 20 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Question 1 of 20
1. Question
A client experienced a DDoS attack from a network of computers and other systems within the city. Which DDoS purveyor is used in this attack?
CorrectIncorrect -
Question 2 of 20
2. Question
Apart from their malicious intent, brute-force attacks can be used for which of the following purposes?
CorrectIncorrect -
Question 3 of 20
3. Question
A new inventory management software vendor announced that a security vulnerability has been discovered and is currently being reviewed by security experts. The next day, an attack occurred on all the systems that had the software installed. What type of attack was attempted?
CorrectIncorrect -
Question 4 of 20
4. Question
You want to update the Windows Defender Security app manually to get the latest updates for newly discovered malware. Where can you access Windows Security Intelligence to receive updated virus and malware definitions?
CorrectIncorrect -
Question 5 of 20
5. Question
You want to block unsolicited messages from non-domain members in a private Windows domain group. Which firewall design should be configured to block messages from non-domain members?
CorrectIncorrect -
Question 6 of 20
6. Question
You want to assign group permissions to users responsible for creating and modifying user accounts and local groups only. They cannot take ownership of files, backup and restore folders, or install or disable device drivers. Which group privileges should be assigned to them?
CorrectIncorrect -
Question 7 of 20
7. Question
You want to set up both Windows Hello face and fingerprint sign-in options on your high-end laptop. After configuring face recognition and fingerprint options, the fingerprint option stops working. You can only sign in using the face recognition option. What can you do to activate both sign-in options so that they can appear as a choice on the Windows login page?
CorrectIncorrect -
Question 8 of 20
8. Question
You installed a game on a laptop running Windows 11 Pro Edition. When you double-click the game’s .exe file, it fails to launch. What is the first step before trying other solutions to resolve the issue?
CorrectIncorrect -
Question 9 of 20
9. Question
Which data-at-rest encryption type is tied to user accounts and requires a password or a PIN?
CorrectIncorrect -
Question 10 of 20
10. Question
You want to set a strong password policy for all the employees in a company. Which two local security policy settings create the most secure and almost impenetrable password policy, according to CompTIA? (Choose two.)
CorrectIncorrect -
Question 11 of 20
11. Question
You left your system for a bathroom break. When you came back, the system showed that someone copied the latest marketing roadmap of one of the most successful products. Which end-user best practice would have avoided this incident while it was still running?
CorrectIncorrect -
Question 12 of 20
12. Question
Which command at the command line prompt activates the default administrator account that is inactive by default in Windows 10/11?
CorrectIncorrect -
Question 13 of 20
13. Question
Which solution turns off the Windows Hello face recognition feature and enables the pin code method for unlocking a Windows 11 machine?
CorrectIncorrect -
Question 14 of 20
14. Question
What can be used to back up and restore Apple devices used in an enterprise environment?
CorrectIncorrect -
Question 15 of 20
15. Question
Which alternative model to BYOD enables organizations to provide their employees with smartphones and other mobile devices, permitting them to use the devices as if they own them?
CorrectIncorrect -
Question 16 of 20
16. Question
What enables the Internet of Things to communicate with other devices with or without the Internet?
CorrectIncorrect -
Question 17 of 20
17. Question
You have been instructed to dispose of 20 SSD drives within the office premises without engaging third-party data disposal services. Which method can be used within the office premises to render all the data on the SSDs completely unrestorable?
CorrectIncorrect -
Question 18 of 20
18. Question
You want to erase all the data from a hard drive without using low-level formatting. Which method can erase data on a hard drive without any possibility of data recovery?
CorrectIncorrect -
Question 19 of 20
19. Question
How can third-party data destruction services prove that the data is destroyed as per the regulations of the industry and the government and that the applicable requirements or laws are followed?
CorrectIncorrect -
Question 20 of 20
20. Question
The network team placed a central Wi-Fi router facing a mirrored wall in the hallway. The users are complaining about frequent disconnections and slow speeds. Which solution can rectify the issue?
CorrectIncorrect
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- Current
- Correct
- Incorrect