C.2.2 CompTIA A+ 220-1102 (Core 2) Domain 2: Security
Which Windows feature can you use to encrypt a hard drive volume?
BitLocker
A public library has purchased new laptop computers to replace their older desktop computers and is concerned that they are vulnerable to theft. Which of the following laptop features should they use to physically secure the new laptops?
Cable locks
You manage a group of 20 Windows workstations that are currently configured as a workgroup. You have been thinking about switching to an Active Directory configuration. Which advantages would you gain by switching to Active Directory? (Select two.)
Centralized configuration control Centralized authentication
What should be created when you destroy a hard drive?
Certificate of Destruction
A technician is replacing a SOHO router and has configured DHCP to assign private IP addresses to hosts on the local network. These hosts can communicate with each other, but users can't browse the internet. Which of the following changes to the SOHO router is MOST likely to restore internet connectivity?
Configure the SOHO router for NAT.
What dynamically assigns IP addresses to clients on the local network?
DHCP
You want to configure User Account Control so that you see the permission prompt only when programs try to make changes to your computer (not when you make changes). You do not want the desktop to be dimmed when the prompt is shown. What should you do?
Disable the Secure Desktop
The D:\ drive in your computer has been formatted with NTFS. The Sales group on your computer has been granted Allow Full Control for the D:\Sales folder. The Rachel user account is a member of the Sales group. Which of the following will BEST prevent Rachel from accessing the D:\Sales\2010sales.doc file without affecting her ability to access any other files in that folder and without affecting the abilities of any other users?
Edit the file properties and assign Rachel the Deny Full Control permission.
At company headquarters, several employees are having issues with their Wi-Fi access suddenly dropping and then reconnecting to the same wireless network. You decide to investigate and determine that someone has set up a rogue access point near company headquarters and is using it to capture sensitive data from the company network. Which type of social engineering attack is being used?
Evil Twin-(involves an attacker setting up a rogue Wi-Fi access point, using a jamming or disassociation attack to knock users off the legitimate network, and then having users reconnect to the rogue access point in order to gain access to sensitive data.)
Which of the following are examples of a strong password? (Select two.)
I love the Linux P3ngu!n Tux il0ve2EatIceCr3am!
Which of the following BYOD risks can leave old information, even financial data and credit card details, vulnerable to malicious purposes?
Improper disposal
Which of the following Bring Your Own Device benefits is a result of users becoming experts in device usage?
Increased productivity
There are two main types of firewalls that you should be familiar with. Which of the following describes a feature of a network-based firewall?
Inspects traffic as it flows between networks.
Which of the following describes spyware?
It monitors the actions you take on your machine and sends the information back to the originating source.
Susan has left the company and has been replaced by Manuel. You create a user account for Manuel on Susan's computer. Manuel calls you and says that he can't open a specific file on the computer. Which of the following will MOST likely correct the problem?
Make Manuel the file owner.
What translates private IP addresses on the local network to public IP addresses on the internet?
NAT
ane, an employee in the human resources department, has created several important PDF documents on her computer that all office managers in her building must read. She would like to make locating these files simple and maintain them as little as possible. It is important that no other users are permitted to view these documents. As the IT technician for your company, Jane has asked you to make this possible. Which of the following would MOST likely fulfill Jane's request?
Network share
A technician is installing a network-enabled smart home control system in a SOHO. Which of the following configurations is MOST likely required on the SOHO router in order to access the system from the internet?
Port sharing
You have been hired to assess a client's security. During your testing, you discover that users have access to other departments' files. Which of the following should you recommend that the company implement?
Principle of least privilege
Which of the following should you perform when disposing of a computer?
Reformat the hard drive
You provide desktop support at a bank's branch office. One of the Windows workstations you manage is used to set up new customer accounts and fill out customer loan applications. Each user account on the system has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. Which of the following would MOST likely increase this system's security? (Select two. Each option is a complete solution.)
Secure the computer system to the desk with a cable lock. Install a privacy filter on the monitor.
You have used EFS to encrypt a directory of highly sensitive company files on your hard drive. You then decide to copy one of the files in the directory to a thumb drive to edit the files on a laptop computer while you are travelling to an industry conference. What is the result of copying the file to the thumb drive?
The file will no longer be encrypted.
What gives priority to certain types of network traffic, such as VoIP phone traffic?
QoS