CompTIA Core2 Practice Test JD Flashcards

Learn & Memorize

1
Q

Question 43:
Your company recently downloaded and installed the latest audio card driver for all of its workstations. Now, several users have had their usernames and passwords for several websites compromised. You believe the two issues are related. If they are, which of the following was MOST likely contained in the audio card driver file that was installed?
A. Worm
B. Ransomware
C. Keylogger
D. Virus

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following allows users to save their current session to disk and before powering down their Windows 10 laptop?

A. Hibernate
B. Sleep
C. Lock
D. Shutdown

A

A. Hibernate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Question 45:
Which of the following MacOS features allows the user to create a user account that is used to sign in to the App Store, iCloud, and iTunes?
A. Spotlight
B. Keychain
C. Apple ID
D. Passwd

A

Apple ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Jason is building an inexpensive workstation for one of the employees at Dion Training. The workstation will utilize an Intel x86 processor. Which of the following editions of Windows will support installation on this workstation? (Choose all of the answers that apply)

A. Windows 10 Enterprise
B. Windows 10 Pro
C. Windows 11 Home
D. Windows 11 Pro

A

Windows 10 Enterprise
Windows 10 Pro

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Jason wants to configure his Windows 10 laptop to suspend individual USB ports when not in use. Which of the following Control Panel sections should he use to set the USB selective suspend feature?
A. Power Options
B. Indexing Options
C. File Explore Options
D. Internet Options

A

Power Option

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which version of Windows supports Virtual Desktops?
A. Windows 7
B. Windows 8
C. Windows 8.1
D. Windows 10

A

Windows 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which version of Windows 10 does not support BitLocker for full disk encryption?

A. Enterprise
B. Pro
C. Home
D. Education

A

C. Home

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Dion Consulting Group has been hired by a small real estate office to build its network. The office has 4 computers running Windows 10 Professional edition configured in a workgroup to access a shared file server. Which of the following types of network models is being used by this real estate office?
A. Peer-to-Peer
B. Hub-an-Spoke
C. Client/Sever
D. Mesh

A

Peer-to-Peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Question 51:
You are working as a service desk analyst. This morning, you have received multiple calls from users reporting that they cannot access websites from their work computers. You decide to troubleshoot the issue by opening up your command prompt on your Windows machine and running a program to determine where the network connectivity outage is occurring. This tool tests the end-to-end connection and reports on each hop found in the connection. Which tool should you use to determine if the issue is on the intranet portion of your corporate network or if it is occurring due to a problem with your ISP?
A. netstat
B. nslookup
C. ping
D. tracert

A

D. tracert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following Linux command-line options would shut down a Linux server 11 minutes from now?
A. shutdown 11:00
B. shutdown +11
C. shutdown now
D. shutdown @11

A

B. shutdown +11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which type of authentication method is commonly used with physical access control systems and relies upon RFID devices embedded into a token?
A. Pre-shared Key
B. TOTP
C. Proximity Cards
D. HOTP

A

C. Proximity Cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the minimum processor required to install Windows 10 (x86) on a device?
A. 1GHz single-core processor
B. 1GHz dual-core processor
C. 2 GHz single-core processor
D. 2 GHz dual-core processor D

A

A. 1 GHz single-core processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following commands is used on a Linux system to edit a text file on a server?
A. ps
B. vi
C. chown
D. pwd

A

B. vi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Michael, a salesman, is on a business trip and is trying to access his corporate email over the hotel’s Wi-Fi network. Michael’s laptop appears to be connected to the hotel’s wireless network, but his email client cannot download any new messages and states, “Network Offline.” Michael contacts the help desk for assistance. What action should the help desk technician tell Michael to perform to solve this issue?
A. Perform a full system scan to see for malware his laptop.
B. Open a web browser, enter google.com, and see if a redirect page is displayed.
C. Disconnect and reconnect to the hotel’s wireless network.
D. Disable and reenable the wireless network adapter on his laptop.

A

B. Open a web browser, enter google.com, and see if a redirect page is displayed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A technician at Dion Training wants to identify which version and build of Windows 10 is installed on a laptop. Which of the following commands should the technician enter at the command line?
A. pathping
B. net user
C. winver
D. gpresult

A

C. winver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following Windows 10 power options will turn off individual devices connected to a laptop to save energy?
A. Hibernate
B. Fast startup
C. Sleep
D. USB selective suspend

A

D. USB selective suspend

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the minimum amount of memory required to install Windows 10 (x64) on a device?
A. 1 GB
B. 2 GB
C. 4 GB
D. 8 GB

18
Q

Which type of installation would require an answer file to install the operating system?
A. Unattended
B. Repair
C. Clean
D. Upgrade

A

A. Unattended

19
Q

Which of the following Control Panel options should a technician configure to automatically adjust the volume of different sounds when the computer is being used to place or receive telephone calls?
A. Program and Features
B. Sound
C. Ease of Access
D. USB selective suspend

20
Q

A small doctor’s office has asked you to configure their network to use the highest levels of wireless security. The office only uses cloud-based SaaS applications to store their patient’s sensitive data. Which of the following protocols or authentication methods should you implement for the BEST security?
A. WPS
B. WPA2
C. WEP
D. WPA

21
Q

You work for Dion Training as a physical security manager. You are concerned that the physical security at the entrance to the company is not sufficient. To increase your security, you are determined to prevent piggybacking. What technique should you implement first?
A. Install CCTV to monitor the entrance
B. Install an access control vestibule at the entrance
C. Require all employees to security badges when entering the building
D. Install and RFID badge reader at the entrance

A

B. Install an access control vestibule at the entrance

22
Q

Dion Training will be hiring 10 college students as interns to work over the summer. Each year, the same interns will work for the company for 8 weeks, but then they will return to school. Next summer, they will return to the company and will need to reaccess their accounts. What is the BEST policy to use so that the interns can use the accounts during the summer but cannot log in during the school year?
A. Delete the user account at the end of each summer
B. Disable the user accounts at the end of each summer
C. Restrict the user accounts using login hours
D. Reset the user accounts at the end of each summer

A

B. Disable user accounts at the end of each summer

23
Q

Which of the following types of attacks is conducted by injecting malicious programming language statements into otherwise trustworthy websites to attack the user’s web browser?
A. Cross-site stitching
B. Zero-day attack
C. SQL injection
D. On-path attack

A

A. Cross-site stitching

24
Q

Which of the following must be enabled to allow a video game console or VoIP handset to configure your firewall automatically by opening the IP addresses and ports needed for the device to function?
A. MDM
B. UPnP
C. NAT
D. DHCP

25
Which of the following types of attacks occurs when an attacker specifically targets the CEO, CFO, CIO, and other board members during their attack? A. Phishing B. Whaling C. Spear phishing D. Vishing
B. Whaling
26
A network administrator receives a call asking for assistance with connecting to the network. The person on the phone asks for the IP address, subnet mask, and VLAN required to access the network. What type of attack might this be? A. Social engineering B. Spoofing C. Zero-day attack D. VLAN hopping
A. Social Engineering
27
Which of the following types of screen locks uses a secret PIN or password to prevent access to a mobile device? A. Swipe B. FaceID C. Passcode D. TouchID
C. Passcode
28
A company is implementing enhanced user authentication for system administrators accessing the company's confidential servers. They intend to use two-factor authentication to accomplish this. Which of these BEST represents two-factor authentication? A. Idea Badge and Keys B. Password and Key Fob C. Fingerprint scanner and retina scanner D. Username and password
B. Password and key fob
29
The network administrator noticed that the border router has high network capacity loading during non-working hours. This excessive load is causing outages for the company's web servers. Which of the following is the MOST likely cause of the issue? A. Evil twin B. Season hijacking C. Distributed DoS D. ARP spoofing
C. Distributed DoS
30
You have been asked to configure your neighbor's SOHO network. Your neighbor wants to build a Minecraft server so that all their friends can play together over the internet. When configuring their firewall, where should you place the server? A. WAN B. LAN C. Perimeter Network D. MAN
C. Perimeter Network
31
What type of malicious application does not require user intervention or another application to act as a host to replicate? A. Macro B. Worm C. Trojan D. Virus
B. Worm
32
Which of the following types of attacks is conducted against a database server by inserting code into an entry field on a web application form for execution to try and gain access to the contents of the database? A. Cross-site stitching B. Zero-day attack C. SQL Injection D. On-path attack
C. SQL Injection
33
What kind of attack is an example of IP spoofing? A. SQL Injections B. On-path attack C. Cross-site Scripting D. ARP Poisoning
B. On-path Attack
34
A technician wants to conduct a vulnerability scan on a server every morning at 3:00 am. Which of the following tools should the technician use? A. MSConfig B. Event Viewer C. Task Scheduler D. PerMon
C. Task Scheduler
35
A network administrator has set up a firewall and set up only three allow rules so that traffic can be sent over ports 21, 110, and 25. Next, they added a final rule of "deny any any" to the end of the ACL to minimize the attack surface and better secure the network. Unfortunately, now the administrator is receiving complaints from users that they cannot access any web pages using their URLs, such as DionTraining.com. Which of the following should the administrator do to correct this issue? A. Add a rule to the ACL to allow traffic on ports 80 and 53 B. Add a rule to the ACL to allow on traffic on ports 143 and 22 C. Add a rule to the ACL to allow traffic on ports 110 and 389 D. Add a rule to the ACL to allow traffic on ports 139 and 445
A. Add a rule to the ACL to allow traffic on ports 80 and 53
36
Which of the following file types are commonly used by network administrators to perform repetitive tasks using a Microsoft proprietary programming language? A. .vbs B. .py C. .sh D. .js
A. .vbs
37
Which of the following remote access protocols should you use to connect to a Linux server securely over the internet? A. Telnet B. FTP C. SSH D. RDP
C. SSH
38
A recently hired security employee at a bank was asked to perform daily scans of the bank's intranet to look for unauthorized devices. The new employee decides to create a script that scans the network for unauthorized devices every morning at 2:00 am. Which programming language would work best to create this script? A. PHP B. C# C. Python D. ASP.NET
C. Python
39
Which of the following backup rotation schemes requires backups to be stored to at least two different types of media? A. Grandfather-father-son B. Tower of Hanoi C. 3-2-1 backup D. FIFO backup
C. 3-2-1- backup
40