Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Certification
Study Set
Computing Technology Industry Association (CompTIA)
Exam 9: CompTIA IT Fundamentals
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 61
Multiple Choice
Ann, a user, is doing her daily job on her company laptop at a coffee shop. She opens an Internet browser and tries to go to her home page. Instead, she is sent to an unfamiliar website. She clears all temporary files and deletes the history, but this continues to occur. Which of the following is the cause of the problem?
Question 62
Multiple Choice
A user is configuring a new wireless router. Which of the following should be done to ensure that unauthorized changes cannot be made?
Question 63
Multiple Choice
Which of the following is the BEST security practice to use when configuring the management options of a wireless router?
Question 64
Multiple Choice
Joe, a user, has just installed his first home wireless router. Which of the following tasks should be considered to help secure the unit from any confirmed exploits?
Question 65
Multiple Choice
An attacker cracks a user's password for all social media, email, and bank accounts. The user needs to change the passwords for all these accounts. Which of the following should the user do in the future to prevent this from happening?
Question 66
Multiple Choice
Which of the following are secure network protocols? (Select TWO) .
Question 67
Multiple Choice
A technician has just finished setting up a SOHO wireless router but the client does not want the PC on the wireless network for security reasons. The technician connects an RJ-45 cable to the computer and the router, but does not receive network connectivity. Which of the following is the NEXT step to diagnose the problem?
Question 68
Multiple Choice
A user is configuring a SOHO wireless router. The user should change the router's default administrator password for which of the following reasons?
Question 69
Multiple Choice
Which of the following will allow the easiest and fastest way to share a single file between two modern smartphones without joining the same WiFi network?
Question 70
Multiple Choice
Which of the following security threats occurs when a user receives an email from an illegitimate source asking for login information?
Question 71
Multiple Choice
A technician is typing the password to logon to a system. A user is standing in close proximity to the technician and is able to see the password being typed. Which of the following BEST describes this situation?
Question 72
Multiple Choice
Which of the following BEST describes the pros and cons of a home wired network?
Question 73
Multiple Choice
Which of the following would BEST be described as password best practices? (Select THREE) .
Question 74
Multiple Choice
While browsing the Internet, a user receives a warning regarding the display of mixed content. The address bar includes https, and the lock symbol is showing. Which of the following does this warning indicate about the website?