Комментарии:
Wow! Great Course Thanks a lot!
ОтветитьI feel so confident watching these test preps because I seem to know all of the answers but a handful of them. However, the prep course I am in has practice tests and I get destroyed in those. Do they make these “for profit” test preps purposely harder so they can guarantee pass rates or am I just not there yet?
ОтветитьI just passed the 1102 exam and your videos (this one in particular) were all very helpful! Thank you so much for making them!
ОтветитьHi buddy, I have a question for you. I see that there are 2 separate playlists for the A+ certificate and the content of the videos in them is different. Which one should I finish first or should I finish one of the two? I will be glad if you answer, have a good day.
ОтветитьQuestion 18 asks: which step should be done first? chose all that apply. How can you do more than one thing first? One will be first and another second, and so the second item will not be first and should not apply. Right?
ОтветитьJust passed the core1 exam last oct19 and currently reviewing for core2. The questions on the actual exam are most situational and asks for specific answer. Great content btw. Thanks!
ОтветитьQuestion 1: The answer is obviously B. Utilizing diskpart and format /p:6 are the ONLY federally accepted way to properly erase sensitive data, with the exception of physical destruction or Deguassing (electromagnetic sterilization).
You can use pre-boot recovery tools CLI on primary drive, or in the active OS (cmd / powershell) if the hdd is installed as a secondary drive.
Third party software cant always be trusted.
Question 43- wouldn’t a botnet that creates zombies be a type of virus that spreads like a worm? A worm doesn’t necessarily have to display images, it is about how it spreads without user input. And a virus doesn’t have to only do damage.
ОтветитьIm sorry but if the Question 13 is on the test that is a really crappy thing. The real term is Vishing (Voice phishing, or vishing, is the use of telephony to conduct phishing attacks). Spoofing is where an email address is faked to look legit in order to gather information or credentials typically. Maybe im splitting hairs but I think that would need to be reworded for those pursuing Sec+ in the future.
ОтветитьWhy would the first thing you do in Question 2 not be unplug the network cables/disable WiFi? Wouldn't you want to stop the potential data breach as quick as possible?
ОтветитьSuperb content! Thank you for all your insight, guidance & dedication to teaching IT!
ОтветитьI have passed the core 2 examen Thank you for your supportive videos
I found this core2 examen more complicated than core 1.
People must be prepared well for the kind of questions Comptia elaborates for this exam.
They ask questions like in real environments, my suggestion is learn the concept
and meanings of terminology, that can help.
No matter how many quizzes you have taken for practice, it’s always going to be different at the test.
Taking core 2 test today 09/23/2023. Thank you for your videos.
ОтветитьI love you
ОтветитьQuestion 13 is so wrong, this is an example of Social Engineering
ОтветитьAbout to do my test tomorrow thanks for this upload !!
ОтветитьCan i get a job withe google certification ?!?
ОтветитьCan i get a job withe google certification ?!?
Ответить