CompTIA A+ 802 Exam 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following ports MUST be open in order for Remote Desktop to function?

3389

A small business owner is setting up their wireless network in their office, which is in a building shared with several other businesses. The owner does not want to disable the SSID broadcasting due to visiting customers needing to use the network, but does not want other businesses to notice the network, let alone access it. Which of the following would BEST accomplish this?

Adjust the radio power so that coverage is restricted to the business.

Which of the following user accounts should be renamed to adhere to security best practices?

Administrator

For the last year, a company has gathered statistics on the most common security incidents. The highest percentage deals with opening email attachments that contain malware. Which of the following would mitigate this issue without reducing productivity?

Annual cyber security education

A user reports that every time they use a search engine and click on a link to go to a website, they instead are taken to a site blocked by their company's content filter. The user is not trying to go to the blocked site and needs to be able to successfully use the search engine to complete their assignment. Which of the following tools would a technician use to BEST resolve this issue?

Anti-malware software

Which of the following is MOST effective in preventing security breaches on a network? (Select THREE).

Antivirus software User education Enforced login/logoff hours

Which of the following security measures is usually found in a laptop?

Biometrics

A technician is trying to prevent a local application from reaching the web due to security concerns. Which of the following solutions could BEST prevent the application from reaching the web? (Select TWO).

Block the application in Windows Firewall Reroute the web address in HOSTS file

A technician is working on a workstation that is receiving read/write failures when trying to access a particular file. Which of the following commands should the technician use to resolve this issue?

CHKDSK

Which of the following commands can be used in Windows XP to modify when the CHKDSK command runs?

CHKNTFS

A technician enabled remote management on the small office WAP to manage this device from another location. Users are reporting that the WAP has changed its SSID without anyone's knowledge. Which of the following would prevent this from occurring?

Change default usernames and passwords

A technician has installed the hardware for a SOHO wired network. Which of the following is the FIRST step to securing the network?

Change default usernames and passwords

A user has just purchased a wireless router for their home. Which of the following should be done to BEST secure the router from unauthorized access? (Select TWO).

Change router default logins Set encryption on the router

Which of the following can be achieved with Group Policy to help with workstation security measures?

Complexity requirements

Which of the following security controls would be an example of the least privilege principle on a home PC?

Create a standard user account for kids.

When securing a new wireless router, which of the following should be changed FIRST?

Default password

Which of the following should a technician implement to prevent external contractors from physically plugging devices into the company's network jacks unless such jacks are designated for guest use?

Disable all switch ports when they are not utilized and enable them on an as needed basis.

Which of the following security best practices would prevent a program on a CD from immediately launching when inserted into a computer?

Disable autorun

A client has a computer that is infected with several viruses and spyware. Which of the following should the technician perform FIRST before spyware removal?

Disable system restore

A technician recently setup a new wired network and wants to ensure only their computers can use it. Which of the following is the MOST secure way to accomplish this?

Disable the extra ports on the router.

A technician is configuring a PC that will have confidential information stored on it. To ensure that only authorized users can access this PC, which of the following should the technician do? (Select TWO).

Disable the guest account Change the default username

A technician has configured the ability to connect to a small office server using remote desktop from a workstation within the office. The technician has reviewed logs that show constant brute force attacks to that server from outside the network. Which of the following would prevent this from occurring?

Disable the remote desktop port

Which of the following helps to prevent virus infections from USB flash drives?

Disabling the autorun feature

Which of the following security threats do shredders help prevent?

Dumpster diving

Which of the following passwords is the MOST secure according to industry best practices?

E@sy2Remember

A company recently had a security breach and is now required to increase the security on their workstations. A technician has been tasked to harden all the workstations on the network. Which of the following should the technician do?

Enable screensaver required passwords

A technician is implementing a SOHO wireless network for Company A that shares a floor with Company B. Which of the following would BEST secure the wireless network so that only Company A employees are allowed access?

Enabling MAC filtering

A technician receives an error every time a workstation boots up. The technician needs to find out what process is responsible for the error. Which of the following utilities would be used FIRST?

Event Viewer

After being infected with a virus, a user's computer does not recognize the user as having local administrator rights to the computer. After troubleshooting the issue, a technician determines the computer needs to be rebuilt and data needs to be restored from the user's backup. Which of the following tools would BEST reset the computer to how it worked when first purchased?

Factory restore CD

When scheduling a backup for preventative maintenance, which of the following would ensure all data was captured?

Full

Which of the following user accounts should be disabled to adhere to security best practices?

Guest

Which of the following options is MOST likely active on a network of three workstations, running Windows 7 Home Edition x64, to enable File and Print sharing?

HomeGroup

A company wants to prevent non-authorized users from entering into a secure building. Which of the following will BEST mitigate this activity?

Install mantraps

A customer needs to setup their laptop for use with a proxy server to browse the web at work. Which of the following areas would a technician need to visit to configure this on a Windows 7 system?

Internet Options

A technician is reconfiguring an email account for off-line mode. Which of the following will describe the expected time of account synchronization with the email server?

It will depend on the time when the account was last synchronized.

Which of the following security concepts establishes the notion that a user should only be given sufficient access to the resources they need to perform their job function?

Least privilege

A technician is tasked with changing the account lockout threshold to 30 minutes in Windows 7. Which of the following should the technician use to accomplish this task?

Local Security Policy

A technician is trying to setup a non-domain user account on a workstation, but receives the following error message "Password does not meet the complexity requirements." Which of the following utilities should the technician use to identify the criteria?

Local Security Policy

A user regularly has to walk away from their computer and is worried someone may access their workstation. Which of the following would BEST prevent this?

Lock the workstation

A company is looking to donate a collection of old PCs that are no longer needed. Which of the following data destruction methods would be MOST secure for highly sensitive information?

Low level 7-pass random wipe

A PC has sensitive data that must be destroyed, before the PC is redeployed. A technician has been tasked with completely wiping the PC hard drive. Which of the following methods is BEST for the technician to use?

Low level format

Which of the following identifies traffic based upon its physical network address?

MAC filtering

A technician needs to create a new folder from the command line on the root of the C drive. Which of the following is the correct command to use?

MD

A technician needs to use Remote Desktop Connection in order to get access to a remote Windows workstation. However, the Programs menu has been hidden and they only have access to the Run command utility or a command-line prompt. Which of the following is the utility that the technician should use to access Remote Desktop Connection?

MSTSC

A company is experiencing issues with third parties tailgating authorized users during entry to secure server rooms. Which of the following would BEST alleviate this problem?

Mantraps

A technician wants to ensure that only authorized administrators can make configuration changes to the company's wireless router. Which of the following MUST the technician change to prevent unauthorized users from modifying the access point configuration?

Manufacturer password

Which of the following commands would a technician use to map a network share?

NET

A technician has 50 identical computers that need to be upgraded to the Windows 7 OS, and are capable of booting from the network. They are running a Gigabit network with a Windows deployment server. Which of the following will be the BEST to use in this scenario?

PXE

An attack that creates a website that looks like another website, with the purpose of learning someone's account information is called which of the following?

Phishing

Which of the following is a security threat that uses email to trick users?

Phishing

Which of the following security threats are MOST often delivered via email? (Select TWO).

Phishing Spam

A technician is tasked with improving the security of a SOHO network. The office is comprised of a single wireless router located under the front desk where the office manager sits. All desktop computers are wired into the router which is configured with strong device credentials. Additionally, wireless is disabled on the router. Which of the following should the technician perform NEXT to improve the security of the SOHO network?

Place the router in a locked room.

A customer wants to use VoIP phones without having to plug them into an electrical outlet. Which of the following switch features would a technician recommend?

PoE

Which of the following is BEST used to prevent other people from viewing a user's computer screen?

Privacy filter

Which of the following features helps to prevent shoulder surfing?

Privacy screen

Which of the following Control Panel utilities would be BEST to use to remove a Windows 7 application?

Programs and Features

For any given 802.11n wireless Internet signal, which of the following is needed to establish a connection?

Proper SSID

A customer reports that after a technician cleaned up a rogue antivirus program, the customer cannot browse the web. Which of the following should the technician check to resolve the situation?

Proxy settings

Which of the following components would a user MOST need when building a virtual server? (Select TWO).

RAM CPU

A user is experiencing slow performance with their computer. A technician suspects the computer has a virus and runs antivirus software. A virus is found and removed, but the performance issue is not resolved. Which of the following should the technician perform NEXT?

Re-establish a new theory or escalate

Which of the following is an advantage of a virtual machine hosted on a PC?

Reduces the amount of physical hardware required.

A company wants to ensure that the latest cyber security threats are known to the employees across the enterprise to minimize occurrences. Which of the following should be implemented?

Regular user education

An employee at a company lost their mobile device that contains proprietary information. Which of the following methods is the BEST to be implemented to prevent unauthorized users from obtaining this information?

Remote wipe

A user is advised by the software vendor that the user must have elevated privileges in order to run a program. The user should do which of the following to BEST accomplish this?

Right click select "run as" and select administrator

Which of the following is solely designed to avoid detection by an antivirus program by using the underlying operating system to its advantage?

Rootkit

After several passes with a malware removal program, the program keeps detecting the same malware infection after a reboot. Which of the following should be done to attempt to remove the offending malware?

Run the malware removal program in Windows Safe Mode

A technician is creating an image that will be used to deploy Windows 7 to 100 PCs. Which of the following tools should be used to accomplish this?

SYSPREP

Which of the following can enable a technician to remove a virus that prevents users from updating their antivirus software?

Safe mode

In order to prevent other users from editing files in `C:\ Files', which of the following steps should be taken?

Set NTFS permissions to read only

In a SOHO wireless network, which of the following prevents unauthorized users from accessing confidential data?

Set encryption

An administrator is concerned about users accessing network shares outside of their job role. Which of the following would BEST prevent this?

Set up shares with permissions based upon group membership.

Privacy filters applied to users computer screens are used to combat which of the following security risks?

Shoulder surfing

Which of the following security threats does NOT use software to extract sensitive information or credentials?

Shoulder surfing

Which of the following security threats requires the attacker to be physically located near the target machine?

Shoulder surfing

An unauthorized user observing system security procedures is known as:

Shoulder surfing.

Which of the following security threats is BEST mitigated through proper user training?

Social Engineering

A pest exterminator tries to gain access to a company's computer lab, but the receptionist does not see an extermination scheduled on the calendar and denies the exterminator access to the lab. Which of the following security threats almost occurred?

Social engineering

A user receives a phone call from a person claiming to be from technical support. This person knows the user's name and that the user has Windows installed on their computer. The technician directs the user to open Event Viewer and look at some event log entries to demonstrate the effects of a virus on the computer. The technician also asks the user for their user ID and password so that they can clean the computer. This is an example of which of the following security threats?

Social engineering

A user receives an unsolicited call from a technician claiming to be from a Microsoft certified partner. The technician tricks the user into allowing them access to their PC because of malware alerts that were being broadcasted. Which of the following attacks is this user a victim of?

Social engineering

Which of the following security threats involve shoulder surfing and phone phishing?

Social engineering

Which of the following would be the QUICKEST means of removing data from a hard drive, when there is no consideration regarding the total destruction of the data?

Standard format

A user on a domain network cannot install software that they need. Which of the following user groups is this user MOST likely associated with?

Standard user

Turnstiles and other mantraps will prevent which of the following security threats?

Tailgating

An entry level network analyst calls and is not sure which Windows OS features to use to check for users who are currently logged on. Which of the following features would BEST assist this analyst?

Task Manager

A user is operating a virtual machine (VM) and discovers it has been infected with malware. Which of the following applies?

The VM can be shut down with no harm to the host PC.

A computer program that functions normally while quietly installing malicious software on a machine is known as a:

Trojan.

A technician must secure company documents from accidental disclosure. Which of the following should be implemented? (Select TWO).

User training Paper shredding

A user would like to run a copy of Windows XP for testing; however, the user is currently using a Windows 7 PC. Which of the following technologies should a technician recommend in order for the user to have access to both systems simultaneously?

Virtualization

Which of the following encryption standards is found on older wireless devices and provides minimal security?

WEP

Which of the following allows a user to enable XP mode?

Windows 7 Professional

Which of the following utilities would a technician use on a Windows Vista or Windows 7 machine to configure what applications are allowed to send/receive data over the LAN connection?

Windows Firewall

Which of the following areas of a file system should a standard user have restricted permissions to in order to promote a security best practice? (Select TWO).

Windows System Files Program Files

Which of the following security threats is defined by its self propagating characteristic?

Worm

Which of the following is TRUE about the difference between a worm and a virus?

Worms self propagate while viruses need human intervention to replicate.

Which of the following paths would a technician use to map a network drive?

\\servername\usershare

Phishing is:

a technique used to obtain financial information from a user mimicking a legitimate website.

Windows Virtual PC is designed to:

allow a user to run older programs in a Windows XP environment.

The benefit of MAC filtering in wireless networking is that the network:

is more secure.

The practice of following an authorized person through an entrance without using a badge to defeat security is called:

tailgating


Conjuntos de estudio relacionados

English 4 - Chapter 4 - Nouns - Seton

View Set

Midterm Prep for CS 498: Cloud Computing Applications

View Set

Chapter 38: Caring for Clients With Cerebrovascular Disorders

View Set

King Midas Vocabulary & Review Questions

View Set

Ch.2.3 Helpdesk: Exploring storage devices and ports

View Set

Uipath : Data MAnupulation With Lists and Dictionaries in Studio

View Set

Certified Ophthalmic Assistant (COA)

View Set