C.2.2 CompTIA A+ 220-1102 (Core 2) Domain 2: Security

¡Supera tus tareas y exámenes ahora con Quizwiz!

You are the owner of a small startup company that consists of only five employees. Each employee has their own computer. Due to the type of services your company offers, you don't foresee the employee count increasing much in the next year or two. As a startup company, you want to keep costs low and facilitate easier file sharing and internet, printer, and local network resource access. Which of the following would be the BEST implementation for your business?

A workgroup

What policy allows employees to use their own computers and mobile devices for work purposes?

Bring Your Own Device

You manage a group of 20 Windows workstations that are currently configured as a workgroup. You have been thinking about switching to an Active Directory configuration. Which advantages would you gain by switching to Active Directory? (Select two.)

Centralized authentication, Centralized configuration control

Which of the following can be used to back up a company's certificate database?

Certificate Manager

Which of the following is a firewall type that scans network traffic based on TCP or UDP transmission?

Circuit-layer gateway

Which of the following hard drive destruction methods only works with mechanical hard drives?

Drilling

A user has a file that contains sensitive data. Which of the following security technologies should he or she use to encrypt the single file?

EFS

You are comparing methods for securing your mobile device. Which of the following is the BEST method to secure your device's storage?

Full device encryption

Which formatting method leaves data on a drive in a state that can be recovered using special software?

High-level formatting

Which of the following Bring Your Own Device benefits is a result of users becoming experts in device usage?

Increased productivity

Which of the following door locks provides authentication to a specific lock over a Bluetooth connection?

Key fob

Which of the following should you implement to monitor and manage the risks of a BYOD policy?

Mobile device management

Which of the following is a form of attack that tricks victims into providing confidential information, such as identity information or login credentials, through emails or websites that impersonate an online entity that the victim trusts, such as a financial institution or well-known e-commerce site?

Phishing

Which Windows component prompts the user for credentials or permissions to protect against unauthorized activities, such as an unintended software installation?

User Account Control (UAC)

Which of the following is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found?

Virus

A malicious person calls an employee from a cell phone. She tells the employee that she is the vice president over the accounting department in the employee's company. She relates that she has forgotten her password and demands that the employee give her his password so that she can access the reports she needs for an upcoming presentation. She threatens to fire the employee if he does not comply. Which of the following BEST describes the type of attack that just occurred?

Vishing

Listen to exam instructions A large number of compromised computers are infected with malware that allows an attacker (herder) to control the computers to spread email spam and launch denial-of-service attacks. Which of the following does this security threat describe?

Zombie/botnet

Mobile device applications fall into two categories. Some are reviewed, approved, and signed with a certificate by the app service, while others are not. Which category do apps fall into if they have been reviewed, approved, and signed with a certificate? What category do apps fall into if they have not been reviewed, approved, and signed with a certificate?

trusted, untrusted

Joe, a mobile device user, is allowed to connect his personally owned tablet to a company's network. Which of the following policies defines how company data is protected on Joe's tablet?

BYOD Policy

Your computer has a single NTFS partition that is used for the C: drive with the folders below. C:\Confidential C:\PublicReports In the C:\Confidential folder, you edit the properties for the two files below and assign the Deny Read permission to the Users group. Reports.doc Costs.doc The C:\PublicReports folder allows the Full Control permission for the Users group. There are no other permissions assigned except the default permissions. You then take the following actions. You: Move Reports.doc from C:\Confidential to C:\PublicReports. Copy Costs.doc from C:\Confidential to C:\PublicReports. Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder?

Deny Read for Reports.doc and Allow Full Control for Costs.doc.


Conjuntos de estudio relacionados

International Business Chapter 13

View Set

questions i got wrong for license

View Set

Questions for RBC and bleeding disorders

View Set

The Rizal Law, Literature, and Society

View Set

Psychology MCAT_Customized Part 1

View Set

NET260.30 LINUX ADMINISTRATION Chapter 14

View Set

Quiz 2 - IT Infrastructure and Internet

View Set

Crusades, World History, Period 3

View Set