Skillsoft Comptia
90 questions across 0 topics. Use the find bar or section chips to jump to what you need.
You have connected your laptop with your TV using the HDMI cable. You want to watch a movie on the TV that is stored on the laptop. However, you are not able to see anything on the TV. Which of the following methods can help you resolve this problem? [Choose all that apply.]
All answers
Identify the features that are offered by Yahoo: Search engine Directory of Web pages Linking with popular search engines E-mail accounts
1,2,3,4
Mobile is connected to your laptop using the USB cable and sharing its Internet. Which of the following method is being used?
Tethering
You need to design a Wi-Fi network in a remote area for a holiday resort. You are asked to design it in such a way to maximize coverage while minimizing the number of access points. There will be relatively few users, and bandwidth requirements will be limited. Which of the following design parameters should you choose?
Use the 2.4 GHz frequencies
If you are using a 15000rpm drive, which type of drive would it be?
SAS
If you are using an iPhone, which of the following cloud storage will provide the easiest synchronization for file storage?
iCloud
You have a desktop system. If you open the system, which of the following are likely to have a fan installed? [Choose all that apply.]
Computer case, CPU, add-on graphic card
You need to connect your laptop to the company's network. However, you are not able to find the wireless network name in the wireless network list. What should you do?
Manually create the wireless network connection
You need to print five copies of a document. You want the printer to print one full copy at a time. Which option should you configure when printing the document?
Collate
You have taken a cloud subscription in which you have the option for pay-as-you-grow. Which of the following feature of cloud provides this benefit?
Rapid Elasticity
Which is the newest motherboard firmware?
UEFI
Which of the following feature on a mobile device is likely to exhaust the device's data package?
Tethering
Refer to the exhibit. Identify the connector shown in the exhibit.
BNC
Which of the following can cause slow transfer speeds from a Web server on the Internet? [Choose all that apply]
Overload on the Internet connectivity and Virus on the local system
if you have an Extreme Digital (xD) card in a digital camera, which of the following methods can you use to transfer the content from it to a desktop system? [Choose all that apply]
Cable, FireWire, and USB
Which of the following is an example of an emulator?
BlueStacks
You need to get cloud storage for a Linux system that you use. You need the storage space only for the data storage purposes. Which of the following will be the best option in this scenario? [Choose all that apply]
Dropbox and Google Cloud
You have paired your mobile device with your car's Bluetooth. You were able to receive calls via car's speakers and the mic. You left the car a few hours, while driving, you receive a call on the mobile device. It did not come through the car's Bluetooth.What could be the possible issue?
One of the Bluetooth devices were turned off.
Which of the following can be considered as the uses of infrared rays (IR)? [Choose all that apply]
TV Remote Control, Heating food, and Industrial heaters
You need to provide resources for a server that you have set up with a cloud service provider. You do not want the cloud service provider's intervention or dependency on them as you may need to add more resources at odd office hours. Which of the following methods would be good to use in this scenario? [Choose two.]
On-demand and Rapid elasticity
Your system is connected to the network. However, since morning, you are not able to connect to the network. The system is not receiving an IP address from the DHCP server. When you inquire, no other users are facing this problem. What could be the possible cause that you should look at first?
The Ethernet cable is faulty.
On a Windows 10 laptop, the Bluetooth adapter is not listed in the Device Manager. How should you ensure that it is listed and enabled?
Enable it in the BIOS
You have configured a CIFS share on a Linux system. CIFS is configured to use port 445. You need to ensure that Windows 10 domain systems should be able to use the share after successful authentication. The domain is set to the highest level. What should you do?
Configure the Linux server to accept only NTLMv2 authentication
You have joined as an IT Manager in a newly incorporated insurance firm. Your firm has setup a large data center with hundreds of servers and a team to manage it. You have been asked to deploy an insurance application, ensuring that the firm retains full control. Where would be the best place to deploy this application?
On-Premise
A network printer has generated a backed-up print queue and is not printing the documents. Which of the following can be a reason? [Choose all that apply]
All answers
Your organization has multiple file servers that are used for file sharing. The Sales team has a requirement for these files to be readily available when they are working remotely. You decide to provide cloud storage. However, before you implement this solution, which of the factors should be a concern from a security aspect?
Sensitivity of files
You create a five-meter T-568A standard straight cable to connect a user PC to the wall jack. After connecting the PC, you notice that the PC does not have connectivity. After basic troubleshooting, you decide to test the cable using the cable tester. If the test fails, which of the following wires in the cable is likely to be causing the problem?
White green
On a printer, which of the following issue is likely to occur if you do not set the paper guide to the correct paper size?
The printed paper will come out creased.
You want to configure Service Locator Protocol (SLP) on your network. You want to use it for the devices to announce their services. To be able to achieve this goal, which of the following criteria must be met? [Choose all that apply.]
Each service must have unlimited attributes, Each service must have a URL, and Each device must always be in scope.
You are using a Mac notebook and an iPhone. You need to connect the devices together and transfer the data from the iPhone to the Mac notebook. Which of the following connection would be most appropriate in this scenario?
Lightning
Which of the following methods can you use to prevent a projector from overheating? [Choose all that apply]
Clean it regularly from dust, replace filters regularly, and use lower brightness
You need to design an intranet service to be used within the enterprise you work for. You are asked to create a single directory service from which usernames, passwords as well as all contact information for employees can be found. All network applications and services that require authentication and information about employees will use this centralized directory service over port 389. Which of the following protocols would you use to develop this directory service?
Lightweight Directory Access Protocol (LDAP)
You have a desktop that has USB 2.0. You need to add a USB 3.0 port but need to minimize the cost. Which of the following method should help you achieve this?
Add a USB expansion card
Which of the following should be changed to prevent BIOS timing reset issue?
CMOS battery
If you are looking for an integrated print server, where are you likely to find it?
In the printer
Your system has the 169.254.10.25 IP address. Identify the type of this IP address.
APIPA
Which of the following drives is being replaced with the M2 drives? [Choose all that apply]
mini-PCIe and mSATA
If you have an integrated GPU on the motherboard, which of the following is it likely to use?
Memory
f you have Bluetooth speakers, with which of the devices can you connect them with?
All answers
All systems and servers on the network are hardened for maximum security. You set up a new DHCP server for a specific subnet, but none of the clients is able to get an IP address from the DHCP Server. You verify that the client pool has enough IP addresses. What could be the probable cause?
The firewall on the server is blocking the requests
You are facing image flickering on a 2-in-1 laptop. Which of the following could contribute to this issue?
Hinges
If you upgrade the video card in your system, which of the following is going to be most impacted?
Power Supply
You need to turn off the following features on a laptop: Wireless Bluetooth Cellular How can you perform this task in the quickest manner?
Put the laptop in the Airplane mode
A network administrator is designing a Wi-Fi network that requires high user density, high bandwidth usage, and a relatively small coverage area. The network will be in a densely populated area. Which of the following standards would be best to use? [Choose two.]
802.11ac and 802.11n at 5GHZ
If you are running two operating systems on a system, which type of system are you using?
Thick client.
You are building a gaming PC and want to buy a multicore processor. Which of the following benefits will you gain with this? [Choose all that apply.]
Increased performance, true concurrency, and energy efficiency
If triple-channel architecture is used, what would be the memory bus size?
192-bit
Which of the following can be the drawbacks of a 10000rpm hard drive? [Choose all that apply]
Price, energy consumption, and noise level
You have several laptops that have 2 GB DDR2 memory modules installed. You need to upgrade the memory in these laptops. You want to utilize the existing memory modules. What should you do?
Add more DDR2 memory modules in the empty slots
You are using a dual-slot graphics adapter in a gaming system, which overheats within a few hours of usage. Which of the cooling method would be most appropriate?
Liquid-based cooling
Which of the following method would you use to ensure data privacy on a printer?
Encrypt the printer hard drive
If you are purchasing a micro-ATX motherboard, how many PCI expansion cards should you be able to install?
4
Refer to the exhibit. Identify the card displayed in the exhibit.
eSATA card
You want to implement Software Defined Networking without adding any extra on-premises hardware for your cloud applications. Your solution should offer zero provisionings. Which of the following should you implement?
Infrastructure as a Service (IaaS)
You connect a desktop to a wall socket and attempt to power it on. However, the desktop is not powering on. What is the first thing that you should check?
Check the wall socket with a tester
If a hard drive is having a 44-pins connector, which of the following size are you using?
2.5 Inches
In which of the following methods can a cloud service provider overprovision the resources?
Resource pooling
Your laptop's lithium-ion battery provides less than one-hour battery time. What should you do to fix this issue?
Replace the battery with a new one
Which of the following technologies can help you complete a payment transaction from your mobile device?
NFC
You have been printing documents on a network printer. However, of late, when you print a document, it only prints a blank paper. What could be the possible cause?
Empty toner
The iCloud Keychain is on, but Safari is not saving or auto filling account or credit card information. You need to ensure you resolve this issue. What should you do?
Check the AutoFill and Private Browsing settings on your device and switch Autofill to on and turn private browsing off
You have recently setup a new virtual environment with multiple virtual machines. You need to protect these virtual machines and need to ensure that the entire environment is secured. Which device should you use?
Virtual firewall
You have a new Android mobile device that you want to use instead of the old mobile device, which is also Android-based. You want to transfer your apps, contacts SMS, and Wi-Fi passwords to the new mobile device from the old mobile device with minimum administrative effort.What should you do?
Use a Google account to back up your mobile device
You need to transfer critical files from your desktop to a file server. You want to ensure that you use a private and safe data stream. Which of the following should you use?
SSH
You are deploying a Web application that will have a database running in the backend. Users from the Internet will log in to the application. You need to secure the application and ensure that the data between each user's system and the Web application is encrypted during transmission. What should you do?
Use the HTTPS with the Web application
Your organization is changing its software deployment model from on-premises to the cloud. You will be given access to only the application that is hosted in the cloud. Which of the following cloud deployment model has your organization opted for?
SaaS (Software as a Service)
You have a Windows 10 system that is running a virtual machine with Windows 8.1, which is part of a workgroup. The Windows 10 system, which is part of a domain, can connect to the network and access resources. However, Windows 8.1 virtual machine is unable to connect to the network. What could be the probable cause?
The virtual machine's network adapter is not configured properly.
Refer to the exhibit. Identify the app delivery method in this exhibit.
Cloud app delivery
You connect a monitor to a system. When you power on the system, you do not see any image on the screen. You verify several times, but there is no display. Which of the following actions should you perform to rectify this problem? [Choose all that apply]
Check the monitor connectivity with the system, Check the seating of the display adapter, and Replace the monitor with another monitor
You need to extend the battery life while working on a full battery and not connected to power. Disabling which of the following services will help you achieve this goal? [Choose all that apply]
Wireless and bluetooth
You have a network printer that is shared through a desktop. The printer and the users are in the same subnet. Of late, the users complain the printer becomes unavailable sometimes. Which of the following can be a probable cause for this issue
Desktop
When two Bluetooth devices need to connect, what should you do to ensure security?
Use Passkey between both the devices
You need to connect a laptop to a mobile device for Internet connectivity. Which of the following solutions will work? [Choose all that apply]
Enable hotspot on the mobile phone and Use tethering method
You have a system with a RAID 0 configuration. One of the drives in your RAID array fails. What actions should you perform to bring your system back to its original state before the failure occurred? [Choose all that apply.]
Replace the failed drive, Restore the data from the backup, and Recreate the RAID array
A Windows system has suffered a Blue Screen of Death (BSOD). The system indicates the IRQL_NOT_LESS_OR_EQUAL error. What does this error mean?
Error is caused by a faulty device driver
A user in your organization has reported a problem where the system has slowed down suddenly. The user states that this problem has occurred from yesterday afternoon. What should you do first in this scenario? [Choose all that apply.]
Ask the user some open-ended questions and perform a backup of the system
Your network uses File and Print Sharing. You need to ensure that you are able to ensure the optimum security on these systems. What should you do? [Choose all that apply.]
All answers
Your office has satellite Internet connectivity, which is causing problems. Every time, there is a thunderstorm or heavy rains, there is intermediate connectivity. You want to replace this connection with a fast connection that has low latency and has high speed. What should you do?
Use a fiber connection
You need to set up a VPN connection with a third-party. You need to have an Internet connection that has low latency and can provide high speed. Which of the following Internet connections will serve your need?
Fiber
When you enable Bluetooth on a mobile handset, how does it find a device for pairing?
It will scan for and list Bluetooth-enabled devices within 10-meters radius
When troubleshooting a problem where users are not able to access resources on the network, after the most probable cause of the problem is determined, what should be done next?
An action plan should be formulated mentioning the steps to resolve the problem
When creating a wireless profile on a laptop, which of the following can cause the SSID not found error? [Choose all that apply]
SSID name spelled wrong and The wireless access point (WAP) is unreachable or turned off
Which of the following can be the reasons for smoke coming out of a system? [Choose all that apply]
Processor and Capacitor
Your system is unable to detect the hard drive a few times when you boot it up. Other times, the hard drive is detected without any problem. When you connect the hard drive using the same cable with another system, this issue does not occur. Which of the following could be causing this problem?
Motherboard
You have upgraded from a 3G to a 4G SIM card. However, when you insert the new SIM into your mobile device, you only get a 3G connection. Which are the most likely causes? [Choose two.]
The mobile device is set to use 3G and The mobile device does not support 4G connectivity
Which of the following can be considered a screen artifact? [Choose all that apply]
All answers
You have a mobile phone with a SIM card, which is activated. You remove your SIM card from your old phone and insert it into a new mobile phone. Which statement is true regarding the new phone?
The IMEI will change, but IMSI will remain the same
Which USB standards are compatible with a USB C-Type cable?
USB 2.0, 3.0, and 3.1
Which technology will allow you to connect a hands-free headset with a mobile device?
Bluetooth
Which of the following could be the cause of an unexpected shutdown.
All answers
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials