Welcome to Sulekha IT Training.

Unlock your academic potential here.

“Let’s start the learning journey together”

Do you have a minute to answer few questions about your learning objective

We appreciate your interest, you will receive a call from course advisor shortly
* fields are mandatory

Verification code has been sent to your
Mobile Number: Change number

  • Please Enter valid OTP.
Resend OTP in Seconds Resend now
please fill the mandatory fields including otp.
CompTIA Practice Test Questions and Answers for Certification Exam

CompTIA Certification Exam Questions and Answers

Organizations are always in the hunt for talented and skilled IT professionals. A certification from CompTIA will always help you to have an edge over your peers.  This CompTIA certification will give you an edge over technical knowledge and non-technical factors like proficiency, reliability, trustworthiness, efficient performance etc. We have compiled few CompTIA practice test questions and answers to quickly glance through before appearing for your CompTIA exam.

Attending the CompTIA exam and scoring passing rate proves that you have the right skills to do the job. Earn a valid certificate for starting a career in IT or have a high jump to show employers that you’ve expanded your knowledge to support IT at hardware or software job role. Get ready to take CompTIA certification exam and make sure you’ve passed your exam by performing practice test with sample CompTIA questions and answers.

Exam Details: https://certification.comptia.org/

Exam Name: Comp TIA

Duration: 90 minutes

No. of questions: 90

Passing score: 75%

Validated against: ISO (International organization for standardization) and (ANSI) American National standards institute.

Format: Multiple choices

Exam price: 339 USD

Comp TIA Certification questions

Question No: 1

An engineer operating with highly detailed CAD files identifies over time that the computer unit isconsuming extensively more time to open files that should get opened quickly. Furthermore, the other applications of the computer are working fine and the engineer verifies the back of all information and data. A computer expert finds out that the computer unit is almost two years old. What will be the first step of the computer expert from the following for resolving the problem?

  1.  Defragmentation on the hard drive B. Restoring the CAD files from backup C. Replacing the hard drive D. Removing and installing the CAD software again

While hard drive set up, files and information are stored and the disk spins at the rate of thousands of RPM. Along with time, the data and information end up stored I the entire disk. It’s just like a library full of files. Defragmentation of the hard drive basically takes scattered data across the physical hard drive and situates them in the nearest clusters so the data can be accessed efficiently.  

Question No: 2

A technician wants to stop a computer application from accessing the web because of some security-related issues. Which is the BEST solution from the above options to stop the application from accessing the web?

  1.  Remove application shortcuts B. Disable all connections for wireless network C. Configuring the computer unit for a static IP D. Open Windows Firewall and block the application

Windows firewall works as anti-malware for a computer system. Blocking the application from windows firewall will just stop the application from running without removing it completely from the system.

Question No: 3

A technician is asked for configuring a new computer unit for booting the operating system from the network. Which of the following option must be enabled FIRST?

  1.  PXE B. UPNP C. Wi-Fi D. WOL

PXE stands for Preboot Execution Environment that allows an operating system to install an operating system remotely from a network. It is used to install OS on multiple computer units from a single network that is a time-saving process.

Question No: 4

A client calls a computer expert regarding issues in their Windows 7 computer. Windows Update tries installing patches in every startup but gets failed on a specific single update. The client tried to Update Windows from Control Panel but failed. Which of the following options will be the BEST?

  1.  Defragmentation of the computer B. Clearing the temporary data and files C. Clearing the Cache files of window updates D. uninstall the feature of Windows Update in Windows 7 and reinstall it from the Microsoft website

Cache file of windows update saves a part of information temporarily in order to improve the performance and speed of windows update. These files can be corrupted that influence the process of window update. Clearing the cache will completely delete the window update related files and the update process gets a fresh start for windows update.

Question No: 5

A computer expert is asked to setup webmail of a user on a tablet, mobile, and laptop. The user wants data synchronization to all the three devices. Which items from the following options can besynced through webmail?

  1.  Social Media B. Programs C. Documents D. Contacts

Webmail is not able to sync programs and documents. It can sync the free/busy notification, calendar, scheduling assistance, and contacts.

Question No: 6

A technician has bought a .dll for fixing a missing .dll issue on a computer. Still, the application is showing “.dll is missing”. To import the .dll files, which of the following tools used by the technician?

  1.  MSConfig B. gpresult C. regedit D. regsvr32regsvr32 gives permission to register and deregister the .dll files. For deregistering the file, the command “regsvr32 /u filename” can be used. It is important to be careful when tackling.dll files. The user should simply register the new and imported .dll and it’s good to go.  

Question No: 7

A person receives a call from a technician claiming to be from Microsoft. The technician tricks the person and gets access to the PCby claiming the malware alerts that are getting broadcasted. Which of the following attacks the person is a victim of?

  1.  Shoulder surfing B. Social engineering C. Phishing attack D. Malware infection

Social Engineering mostly works on the individuals who are either innocent, under threat or easily trust others. Social engineering can cost a user higher loss as the potential intruders want to steal their money. For this, all the employees within a company must be educated towards these activities and ways to prevent them.

Question No: 8

Which of the following security issues needs the attacker/hacker to be physically available nearthe target device?

  1.  Social engineering B. Shoulder surfing C. Phishing D. Rootkit

Shoulder Surfing is like spying on a person as gets access to their private information. For instance, a potential intruder at an ATM tries to steal the Pin number of a target person. In computer systems, press Windows Key + L for locking the computer while leaving.

Question No: 9

A company has collected information of for a previous year about the common securityissues and incidents. The maximum problem deals with malware while opening the attachments in the emails. Which of the following solution can resolve the problems without affecting productivity?

  1.  Update antivirus signatures more often B. Annual cybersecurity education C. Block all attachments on email D. Install an IPS on each computer unit

It will be good to educate users regarding computer malware and security. Most of the employees are not aware of security and makes mistakes. An annual orientation program should be organized for educating the users.

Question No: 10

A user wants an external monitor, mouse, and keyboard for his laptop for a specific reason. The user want to see the computer in the external monitor so he closes the lid but the laptop gets into sleepmode. Which of the options can solve the computer from getting into sleep mode?

  1.  Action Center B. Display Settings C. System D. Power Options

In the power options, there will be the option "When I close the lid" in which there is another option as "Do nothing." This will prevent the laptop from getting into the sleep mode.

Question No: 11

A computer admin wants to give the other users limited access rights in PC so that theycan install printers and make other accounts for the local user. Which of the accountsmust be created for the users by computer admin?

  1.  Administrator B. Power user C. Standard D. Guest

Question No: 12

A network administrator is not able to install programs on a computer unit. What is the reason the administrator is not able to install applications?

  1.  Denial of service B. Authentication issue of a username on the network. C. The username is not linked with local administrator group. D. Security patches are not applied by the administrator.

The username needs to be a part of the local administrator groups because it gives permission to install or uninstalls the applications and software.

Question No: 13

A user faces an error in a software application. The user asks a technician fortechnical support. Which of the option will let the user invite the technician inthis case?

  1.  Remote desktop B. Remote assistance C. telnet D. FTP

Remote assistance is a good option for reaching to the users over a network. The technician can assist the user on the network that helps the user in troubleshooting the issues. It is suggested to teach the users regarding Quick Assistance and it saves time and money at the same time. 

Question No: 14

A user wants to re-install Windows 7 on his computer device but he does not have any disk for the operating system. How the technician will solve this matter?

  1.  Recovery partition B. System restore C. Primary partition D. System refresh

Most of the computers have a recovery drive that comes without an OS disk. This is basically the best solution except the Recovery Drive is damaged otherwise a completely new OS is required.

Question No: 15

A technician is asked to install the operating system on every PC along with an emptythe hard drive on a network. There should be a minimal physical interaction of the technician with the PCs. Which is the best way to do the task?

  1.  Cloning the OS onto optical media from an image. B. Using original software media for loading the OS on every PC. C. Setting up a central image that can be load by PC from a PXE boot.D. Creating an image and copying it by a USB drive with use of an unattended answer file.

PXE boot permits a user to use the central ISO for installing an OS on different PC's. It is the best option to install OS on multiple PCs. It saves a lot of time and cost of operation to install OS.  

Question No: 16

A user wants to set up their email on the iOS device. The email is required to sync allmodifications made with the PC and server. What option will the technician useto for accomplishing this?

  1.  SMTP B. IMAP C. SMNP D. POP3

IMAP stands for Internet Message Access Protocol that stores and access emails on a server as if they are stored locally. IMAP allows various PCs to access the Email without any problem and conflictions.

Question No: 17

A client with a computer needs assistance to set Windows 7 parental controlsin their internet browsing application. The client wants the child to spenda limited time for a specific website. In internet options, which option will allow theuser to change the settings?

  1.  Privacy B. Content C. Security D. Advanced

This tab allows a user for assessing parental controls where a user can set filters for children. This will prevent the child to access a website over a specific time period.

Question No: 18

Over a corporate network, which functions are used for redirecting the networktraffic for monitoring or filtering? 

  1.  Content Advisor B. Network Drive Mapping C. Proxy Settings D. Local Security Policy

Proxy Servers are hubs of the network that work as the filter system for internet traffic. This permits the custom filtering and monitoring of a network that is the best option for the corporate setting. It can also be configured for blocking access to frequent websites and keeps programs connected with a server. 

Question No: 19

A technician is invited by a manager of IT security that a weakness has beenidentified in the wireless router. The weakness can let a hacker to take remoteaccess to the computer. Which operation the technician is going to perform for addressing theissue?

  1.  Power off the device B. Updating the Wi-Fi antenna C. Installing an add-on card D. updating firmware

Computer manufacturers regularly issue updates to the firmware, check back frequently to see if that is being happened with a device over a network and verify to register vital devices and register for updates on different patches.

Question No: 20

Which of the following updates must be done frequently for ensuring the operating systemis updated with the latest security patches?

  1.  Anti-malware updates B. Windows updates C. Driver updates D. Firmware updates

Updating the OS regularly is critical for security, plus making sure the updates of Firmware helps the hardware work precisely. It is like the OS might have a security issue before the Hardware of the system though and the security patches tend to occur regularly to the operating system.  

Question No: 21

A client has just installed numerous applications on a Windows 7 computer unit and isnow facing impulsive restarts and slow performance in his computer. After uninstallingsome of these applications, the issue still not resolved. Which toolcould the technician use for troubleshooting the issue while preventing loss of data?

  1.  Factory restore B. msconfig C. SecureBoot D. diskpart

Msconfig is an effective tool to remove bloatware that bloats the computer and stops programs from booting automatically. A few troubleshooting time in Msconfig can identify any programs which are still getting triggered and causing the issues in the boot process.  

Question No: 22

A technician has configured the capability for connecting with a small office server with the use of remote desktop using a computer unit of the office. The computer logs have reviewed that showcontinuous brute force attacks to the server that is being done from the outer side of the network. Which of the followingoptions would stop these attacks?

  1.  Configuring the server for using a static IP B. Moving the server to the DMZ logically C. Reallocating the server to a diverse closet of networking D. Disabling the remote desktop port

As the attacks are being performed from the outer side of the server so clearly there is a need to disable the remote desktop port to stop the attack.

Question No: 23

Which of these types of the file system is used mostly for optical media?

  1.  FAT32 B. NTFS C. HPFS D. CDFS

CDFS is the file extension that is used with Linux for a virtual file system.

Question No: 24

A technician has imported a new surge protector for protecting equipment within the environment of production. The surge protectors functions safeguard the equipment which is connected by directing the surges to:

  1.  path of lowest inductance.   B. path of shortest conductance. C. path of highest voltage. D. path of least resistance.

Surge protectors short or block the voltages to the ground that goes beyond a set threshold. This is completely critical to have safety against surges of power. This is a despicable solution to something which can damage an IT set-up. 

Question No: 25

Which security threat in the following that shows itself as a genuine software?

  1.  Trojan B. Virus C. Worm D. Spyware

Trojan always comes from the Trojan horse classic fable that has the ability to hide the attacker inside. Trojans pretend to be some helpful programs while draining off data and install harmful files in the system.

Question No: 26

Which of the options will help in protecting a company from additional exposure of dataAfter a lot of user passwords are previously been leaked because of some policy breach?

  1.  Using multi-factor authentication B. Need strong passwords C. Enabling encryption of file D. restricting user permissions

Multi-Factor Authentication is an effective method for keeping people from making use of stolen email for logging into a device. Generally, it sends a confirmation code on email or on the device. Here, only the authenticated person with the email can get access to the files.

Question No: 27

A technician is asked to dispose of hard drives that consist of sensitive data of the employee. Which would be the BEST solution to dispose of the drives?

  1.  Recycling B. Overwriting C. Shredding D. Reformatting

Physically damaging a hard drive is the most effective way in comparison to recycling, reformatting and overwriting because they all have risks of recovery. Data is not lost immediately after deletion some software can recover that data.

Take the next step toward your professional goals

Talk to Training Provider

Don't hesitate to talk to the course advisor right now

Take the next step towards your professional goals in CompTIA

Don't hesitate to talk with our course advisor right now

Receive a call

Contact Now

Make a call

+1-732-338-7323

Enroll for the next batch

Latest blogs on technology to explore

X

Take the next step towards your professional goals

Contact now