Topic 6, Exam Pool F
A network administrator is setting up the security for a SOHO wireless network. Which of the following options should the administrator enable to secure the network?
A. NATBWPA3
B. 802.1X
C. Static IP
Explanation: To secure a SOHO wireless network, enabling WPA3 is the recommended option. WPA3 (Wi-Fi Protected Access 3) is the latest security certification program developed by the Wi- Fi Alliance to secure wireless computer networks. It provides cutting-edge security protocols and cryptographic methods to enhance and replace its predecessors, WPA2 and WPA, offering improved protection against brute-force attacks and ensuring better privacy on public networks.
A technician needs to manually set an IP address on a computer that is running macOS. Which of the following commands should the technician use?
A. ipconfig
B. ifconfig
C. arpa
D. ping
Explanation:
ifconfig is a command-line utility that allows you to configure network interfaces on macOS
and other Unix-like systems1. To set an IP address using ifconfig, you need to know the
name of the network interface you want to configure (such as en0 or en1), and the IP
address you want to assign (such as 192.168.0.150). You also need to use sudo to run the
command with administrative privileges2. The syntax of the command is:
sudo ifconfig interface address
For example, to set the IP address of en1 to 192.168.0.150, you would type:
sudo ifconfig en1 192.168.0.150
You may also need to specify other parameters such as subnet mask, gateway, or DNS
servers, depending on your network configuration3. The other commands are not directly
related to setting an IP address on macOS. ipconfig is a similar command for Windows
systems4, arpa is a domain name used for reverse DNS lookup, and ping is a command for
testing network connectivity.
A company was recently attacked by ransomware. The IT department has remediated the threat and determined that the attack method used was email. Which of the following is the most effective way to prevent this issue from reoccurring?
A. Spam filtering
B. Malware preventionsoftware
C. End user education
D. Stateful firewall inspection
Explanation: To prevent ransomware attacks via email, the most effective way is End user education (C). Educating users about the dangers of phishing emails, how to recognize suspicious emails, and the importance of not clicking on unknown links or attachments can significantly reduce the risk of ransomware infections. Awareness and training can empower users to act as the first line of defense against such cyber threats
A network administrator is deploying a client certificate to be used for Wi-Fi access for all devices in an organization. The certificate will be used in conjunction with the user's existing username and password. Which of the following BEST describes the security benefits realized after this deployment?
A. Multifactor authentication will be forced for Wi-Fi.
B. All Wi-Fi traffic will be encrypted in transit.
C. Eavesdropping attempts will be prevented.
D. Rogue access points will not connect.
Explanation:
The security benefits realized after deploying a client certificate to be used for Wi-Fi access
for all devices in an organization are that all Wi-Fi traffic will be encrypted in transit. This
means that any data transmitted over the Wi-Fi network will be protected from
eavesdropping attempts. Rogue access points will not connect to the network because they
will not have the client certificate. However, multifactor authentication will not be forced for
Wi-Fi because the client certificate is being used in conjunction with the user’s existing
username and password12.
A technician is setting up a new laptop for an employee who travels. Which of the following is the BEST security practice for this scenario?
A. PIN-based login
B. Quarterly password changes
C. Hard drive encryption
D. A physical laptop lock
Explanation:
Encrypting the laptop's hard drive will ensure that any sensitive data stored on the laptop is
secure, even if the laptop is lost or stolen. Encryption ensures that the data cannot be
accessed by anyone without the correct encryption key. This is an important security
measure for any laptop used by an employee who travels, as it helps to protect the data stored on the laptop from unauthorized access.
A technician has verified that a user's computer has a virus, and the antivirus software is out Of date. Which of the following steps should the technician take NEXT?
A. Quarantine the computer.
B. use a previous restore point
C. Educate the end user about viruses
D. Download the latest virus definitions
Explanation:
This will ensure that the antivirus software is up-to-date, and can detect any new viruses
that may have been released since the last virus definition update.
The CompTIA A+ Core 2 220-1002 exam covers this topic in the following domains: 1.3
Explain the importance of security awareness and 2.2 Given a scenario, use secure data
management and disaster recovery principles.
A technician is working to resolve a Wi-Fi network issue at a doctor's office that is located next to an apartment complex. The technician discovers that employees and patients are not the only people on the network. Which of the following should the technician do to BEST minimize this issue?
A. Disable unused ports.
B. Remove the guest network
C. Add a password to the guest network
D. Change the network channel
Explanation:
Changing the network channel is the best solution to minimize the issue of employees and
patients not being the only people on the Wi-Fi network5.
References: 3. Sample CompTIA Security+ exam questions and answers. Retrieved from
https://www.techtarget.com/searchsecurity/quiz/Sample-CompTIA-Security-examquestions-
and-answers
A technician wants to improve password security after several users admitted to using very simple passwords. Which of the following is the best way to resolve this issue?
A. Requiring four character types
B. Decreasing the password expiration times
C. Enabling an automatic lock timer
D. Adding two characters to the minimum password length
Explanation:
Improving password security is crucial to protect user accounts from unauthorized access.
Requiring passwords to include four character types—uppercase letters, lowercase letters,
numbers, and special characters—significantly enhances password complexity. This
diversity in characters makes passwords much harder to guess or crack using common
methods like brute force attacks, thereby improving overall security.
Requiring four character types: This approach forces users to create more
complex and less predictable passwords, reducing the risk of simple passwords
that are easy to exploit.
Decreasing the password expiration times (B) can encourage users to change their
passwords more frequently but does not directly address the issue of password complexity.
Enabling an automatic lock timer (C) can add a layer of security by locking accounts after a
period of inactivity, but it does not improve the strength of the passwords themselves.
Adding two characters to the minimum password length (D) can help to some extent by
making passwords longer, but without requiring a mix of character types, passwords might
still remain relatively easy to guess or crack.
A team of support agents will be using their workstations to store credit card data. Which of the following should the IT department enable on the workstations in order to remain compliant with common regulatory controls? (Select TWO).
A. Encryption
B. Antivirus
C. AutoRun
D. Guest accounts
E. Default passwords
F. Backups
Explanation:
Encryption is a way of protecting cardholder data by transforming it into an unreadable
format that can only be decrypted with a secret key1. Backups are a way of ensuring that
cardholder data is not lost or corrupted in case of a disaster or system failure2. Both
encryption and backups are part of the PCI DSS requirements that apply to any entity that
stores, processes, or transmits cardholder data1. The other options are not directly related
to credit card data security or compliance.
Which of the following is a consequence of end-of-lite operating systems?
A. Operating systems void the hardware warranty.
B. Operating systems cease to function.
C. Operating systems no longer receive updates.
D. Operating systems are unable to migrate data to the new operating system.
Explanation:
End-of-life operating systems are those which have reached the end of their life cycle and
are no longer supported by the software developer. This means that the operating system
will no longer receive updates, security patches, or other new features. This can leave
users vulnerable to security threats, as the system will no longer be protected against the
latest threats. Additionally, this can make it difficult to migrate data to a newer operating
system, as the old system is no longer supported.
Users report having difficulty using the Windows Hello facial recognition feature. Which of the following is a secondary feature of Windows Hello that can be used to log in?
A. Personal identification number
B. Username/password
C. One-time-use token
D. Cryptographic device
Explanation:
Windows Hello is a biometric-based technology that enables Windows 10 users to
authenticate secure access to their devices, apps, online services, and networks with just a
look or a touch. If users have difficulty using the facial recognition feature, Windows Hello also supports a Personal Identification Number (PIN) as a secondary feature for logging in.
The PIN is tied to the specific device on which it is set up, adding a layer of security even if
the PIN is obtained by someone else.
Personal identification number: The PIN serves as an alternative to the facial
recognition feature, allowing users to quickly and securely access their devices
without relying solely on biometric authentication.
Username/password (B) is the traditional method of authentication but is not specifically a
secondary feature of Windows Hello. One-time-use token (C) and cryptographic device (D)
could be part of an MFA setup but are not directly related to Windows Hello's alternate
authentication options.
A company is deploying mobile phones on a one-to-one basis, but the IT manager is concerned that users will root/jailbreak their phones. Which of the following technologies can be implemented to prevent this issue?
A. Signed system images
B. Antivirus
C. SSO
D. MDM
Explanation:
MDM stands for Mobile Device Management, and it is a way of remotely managing and
securing mobile devices that are used for work purposes1. MDM can enforce policies and
restrictions on the devices, such as preventing users from installing unauthorized apps,
modifying system settings, or accessing root privileges2. MDM can also monitor device
status, wipe data, lock devices, or locate lost or stolen devices1.
Page 25 out of 62 Pages |
Previous |