or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports.
Answer option C is incorrect. Setting hidden attributes on files cannot protect computers from unauthorized access, adware, and malware.
Answer option B is incorrect. Configuring auditing will not protect computers from unauthorized access, adware, and malware. Auditing is used to track user accounts for file and object access, logon attempts, system shutdown, etc. This enhances the security of the network.
TechNet, Contents: " Chapter 2 - Malware Threats"
Which of the following types of attacks entices a user to disclose personal information such as social security number, bank account details, or credit card number?
Password guessing attack
Phishing is a type of scam that entice a user to disclose personal information such as social security number, bank account details, or credit card number. An example of phishing attack is a fraudulent e-mail that appears to come from a user's bank asking to change his online banking password. When the user clicks the link available on the e-mail, it directs him to a phishing site which replicates the original bank site. The phishing site lures the user to
provide his personal information.
Answer option B is incorrect. Spoofing is a technique that makes a transmission appear to have come from an authentic source by forging the IP address, email address, caller ID, etc. In IP spoofing, a hacker modifies packet headers by using someone else's IP address to his identity. However, spoofing cannot be used while surfing the Internet, chatting on- line, etc. because forging the source
IP address causes the responses to be misdirected.
Answer option D is incorrect. Replay attack is a type of attack in which attackers capture packets containing passwords or digital signatures whenever packets pass between two hosts on a network.
In an attempt to obtain an authenticated connection, the attackers then resend the captured packet to the system.
Answer option A is incorrect. A password guessing attack occurs when an unauthorized user tries to log on repeatedly to a computer or network by guessing usernames and passwords. Many password guessing programs that attempt to break passwords are available on the Internet. Following are the types of password guessing attacks:
Brute force attack Dictionary attack Reference: " en.wikipedia.org/wiki/Phishing"
Which of the following devices does SCSI support? Each correct answer represents a complete solution. Choose all that apply.
Hard disk drive
Small Computer System Interface (SCSI) supports CD drive, tape drive, and hard disk drive. What is SCSI? Hide
Small Computer System Interface (SCSI) is the second most popular drive interface in use today after the Integrated Drive
Electronics (IDE) interface. SCSI is faster than IDE and supports more devices. SCSI devices, such as hard disk drive and CD-ROM drive, are better suited in a network
environment in which many users access shared drives simultaneously. SCSI has three
standards: SCSI-1, SCSI-2, and SCSI-3.
TechNet, Contents: "Storage Management Operations Guide"
Which of the following wireless standards has a transmission speed of up to 720 Kbps?
Bluetooth is a standard for short-range radio links between laptops, mobile phones, digital cameras, and other portable devices. Bluetooth devices contain a transceiver chip. The transceiver transmits and receives data with the frequency of 2.45 GHz. It has transmission speeds of up to 720 Kbps and the network range of 33 feet.
Answer option A is incorrect. Infrared is a communication medium used for wireless networks to transfer data between devices. Infrared can transmit signals at high rates because of the high bandwidth of infrared light. An infrared network can normally broadcast at 10 Mbps.
Answer option D is incorrect. The Wi-Fi (802.11b standard) wireless technology is used to offer Internet access in public places. The 802.11b standard, defined by IEEE, is an extension of the 802.11 standard of wireless network. It is also referred to as 802.11 High Rate. It operates in 2.4GHz band and brings data rates up to 11Mbps.
Answer option C is incorrect. The maximum data transfer rate of the 802.11a wireless standard is 54 Mbps.
How many pins are available on a PS/2 Mini-DIN connector?
A PS/2 Mini-DIN connector has 6-pins , while only four are used. Pin 1 is used for keyboard data signal, pin 3 is ground, pin 4 has +5 Volt DC, pin 5 is used for keyboard
clock, and pins 2 and 6 are not used. The PS/2 6-pin Mini-DIN connector is used for both keyboard and mouse. Older keyboard connectors use 5-pin DIN connector.
You work as a Network Administrator for Tech Perfect Inc. The company has a Windows- based network. You do maintenance work on a Windows 2000 Professional computer. You require to perform the following jobs: Exhaustive disk checking. Locate bad sectors (if any). Recover readable information. Which of the following commands will you use to accomplish the task?
In order to accomplish the task, you will have to run the following commanD. CHKDSK /r
The CHKDSK command verifies the integrity of the hard disk installed on a computer. Using the command with different parameters can resolve a number of issues, which are described as follows:
CHKDSK /f It fixes all the errors on the hard disk of a computer. CHKDSK /vIt displays the full path and name of every file on the disk. CHKDSK /r It locates bad sectors and recovers readable information.
CHKDSK /l It changes the log file size to the specified number of kilobytes. If the size is not specified, it displays the current size.
CHKDSK /i It performs a less vigorous check of index entries. CHKDSK /c It skips checking of cycles within the folder structure.
TechNet, Contents: "Chapter 27 - Troubleshooting Disks and File Systems"
Which of the following statements about Bluetooth are true? Each correct answer represents a complete solution. Choose two.
It forms a network whenever two Bluetooth devices come within a range of ten meters.
It has a maximum transmission range of 200 meters.
It does not require a line-of-sight connection between devices.
It requires a line-of-sight connection between devices.
Bluetooth is a standard for very low powered and short-range radio connections. As a radio technology, it does not require a line-of-sight connection as an infrared connection does. Bluetooth is used to link Personal Digital Assistant (PDA), mobile phones, and laptops, and provides them with Internet access via hot spots. It uses the 2.4 Ghz spectrums with a data
transfer rate of about 1
Mbps. Bluetooth networks are not permanent as compared to other networks where a central communication point is needed such as a hub or a router. A Bluetooth network can be formed when two Bluetooth devices are within a range of ten meters, enabling them to communicate directly with each other. This dynamically created network is known as a piconet. A Bluetooth-enabled device can support up to seven other Bluetooth devices in a master-slave relationship; the first Bluetooth device is the master, and all the other devices are slaves that communicate with the master in one piconet. The maximum transmission range of Bluetooth is around 10 meters.
Answer option D is incorrect. The infrared devices require a line-of-sight connection between devices.
Answer option B is incorrect. The maximum transmission range of Bluetooth is around 10 meters.
You have an older Windows 98 computer. You wish to upgrade to Windows Vista Home Basic. What must you do?
First upgrade to Windows 2000 then upgrade to Vista Home Basic.
First upgrade to Windows XP Pro, then upgrade to Vista Home Basic.
Simply buy and install the Windows Vista Home Basic Upgrade.
First upgrade to Windows XP Home, then upgrade to Vista Home Basic.
You will have to first upgrade to Windows XP home, and then to Vista Home.
Answer option C is incorrect. Windows 98 cannot be directly upgraded to Windows Vista. Answer option B is incorrect. Windows XP professional cannot be upgraded to Windows Vista Home
Basic, but it can be upgraded to Windows Vista Business or Ultimate.
Answer option A is incorrect. Windows 2000 cannot be upgraded to Windows Vista.
Research what’s available, and pick an IT certification that will help you achieve your career goals. Use the CompTIA Career Roadmap to learn about different IT career paths and IT salaries so you can decide which certification may be best for you.
From entry-level knowledge in computer hardware and computer software to advanced IT security and IT networking skills, CompTIA IT certifications cover it all. Acquire foundational knowledge with core certifications and then specialize by applying a CompTIA Career Pathway to deepen your skills in infrastructure and cybersecurity.
Browse CompTIA Certifications
There’s a wealth of certification training and learning options available that will prepare you for your CompTIA certification exam.
Combine instructor-led training with self-study materials, or use CompTIA CertMaster, a tailored online training companion that speeds up your IT certification training for maximum learning efficiency.
Explore Training Options
It’s a good idea to always understand what you’re training for. That’s why we’re offering not just exam objectives, but also practice questions for download. While the same exact questions will not be on your exam, these will give you a good idea of what to expect when you’re ready to take your certification exam.
Be sure to check out online communities on Facebook, LinkedIn and Reddit to see what others are saying about CompTIA exams.
Download Exam Objectives
Download Practice Questions
You’ve identified the certification you want to take, learned the skills and knowledge covered by the exam and studied the exam objectives and practice questions. Now it’s time to take your test. CompTIA partners with Pearson VUE to deliver our exams around the world. Buy a certification exam voucher and visit a testing center to take your exam.
SAVE 10% ON YOUR NEXT EXAM OR CERTMASTER
With your certification in hand, you’re joining a community of more than 2 million IT professionals who are CompTIA certified. You now have a globally recognized credential that is on your side to grow your IT career.
The CompTIA certification logo will help you stand out and earn attention with your resume and LinkedIn profile.
There’s also CompTIA AITP, CompTIA’s association for IT professionals, that provides you with all the tools you need to find your first or next job in IT and fuel up your IT career!
Learn More About CompTIA AITP