220-802 CompTIA A+ Certification Practice Exam Set 7

A technician is installing a webcam in a nursery for a user to monitor their baby. The user wants toensure that the webcam is not broadcasting externally. Which of the following would the technicianimplement on the SOHO router to prevent the broadcast?

Options are :

  • Change the default SSID
  • Block the outbound port
  • Enable static IPs
  • Enable MAC filtering

Answer : Block the outbound port

Which of the following should a technician do LAST after cleaning up a virus infection?

Options are :

  • Educate the end user
  • Enable system restore and create restore point
  • Schedule scans and updates
  • Update antivirus software

Answer : Educate the end user

When securing a small office home office (SOHO) that has empty cubicles with unused networkports, which of the following can be used to secure ONLY the unused ports?

Options are :

  • Disable DNS on the network.
  • Power down the router when it is not being used.
  • Disable the ports on the router or switch.
  • Use DHCP addressing on the network.

Answer : Disable the ports on the router or switch.

Which of the following features helps to prevent shoulder surfing?

Options are :

  • Privacy screen
  • Auto adjust
  • Degaussing
  • Native resolution

Answer : Privacy screen

CompTIA JK0-801 A+ Networking & PC Hardware Practice Exam Set 10

Which of the following security threats is BEST mitigated through proper user training?

Options are :

  • Social Engineering
  • Browser Adware
  • Rootkits
  • A Worm

Answer : Social Engineering

The practice of following an authorized person through an entrance without using a badge todefeat security is called:

Options are :

  • phishing
  • spamming
  • shredding
  • tailgating

Answer : tailgating

A user has a perimeter firewall and up-to-date antivirus software. The user is asking what elsethey can do to improve their security. Which of the following will have the MOST impact onnetwork security? (Select TWO).A. Install additional antivirus softwareB. Disable screen saversC. Conduct a daily security auditD. Assign security rights based on job rolesE. Use strong passwords

Options are :

  • D,E
  • B,C
  • C,D
  • A,B

Answer : D,E

CompTIA Network+ 6 Certification Practice Exams - 2019 Set 12

A user has just purchased a wireless router for their home. Which of the following should be doneto BEST secure the router from unauthorized access? (Select TWO).A. Change router default loginsB. Change the security settings on their computerC. Set encryption on the routerD. Update router firmwareE. Change the encryption on the computer’s wireless adapter

Options are :

  • B,C
  • A,B
  • A,C
  • D,E

Answer : A,C

A user does not want their kids to be able to install software on their home desktop. Which of thefollowing types of accounts should the user set up in Windows 7?

Options are :

  • Remote Desktop Users
  • Standard
  • Power User
  • Administrator

Answer : Standard

A client has a computer that is infected with several viruses and spyware. Which of the followingshould the technician perform FIRST before spyware removal?

Options are :

  • Disable system restore
  • Disable network cards
  • Run Windows Update
  • Run the chkdsk /r command

Answer : Disable system restore

CompTIA JK0-015 E2C Security+ Certification Practice Test Set 13

A technician has installed the hardware for a SOHO wired network. Which of the following is theFIRST step to securing the network?

Options are :

  • Change default usernames and passwords
  • Disable unused ports
  • Enable MAC filtering
  • Assign static IP addresses

Answer : Change default usernames and passwords

Which of the following encryption standards is found on older wireless devices and providesminimal security?

Options are :

  • AES
  • WEP
  • WPA
  • WPA2

Answer : WEP

Which of the following is BEST used to prevent other people from viewing a user’s computerscreen?

Options are :

  • Privacy filter
  • Anti-virus software
  • Biometric device
  • Key fob

Answer : Privacy filter

JK0-017 CompTIA E2C Project+ Certification Practice Exam Set 4

Which of the following common security threats could be occurring when a user calls and requestsWhich of the following common security threats could be occurring when a user calls and requests

Options are :

  • Shoulder surfing
  • Spyware
  • Social engineering
  • Phishing

Answer : Social engineering

A technician needs to change the minimum password length to 8 characters to make it moresecure. Which of the following system settings should the technician configure?

Options are :

  • System Configuration
  • Local Security Policy
  • Windows Security Center
  • Windows Firewall

Answer : Local Security Policy

Which of the following is considered a method of physical security?

Options are :

  • Cipher locked doors
  • Firewall
  • NTFS
  • Strong passwords

Answer : Cipher locked doors

BR0-001 CompTIA Bridge Security+ Certification Practice Exam Set 2

A user is experiencing slow performance with their computer. A technician suspects the computerhas a virus and runs antivirus software. A virus is found and removed, but the performance issueis not resolved. Which of the following should the technician perform NEXT?

Options are :

  • Establish a plan of action to resolve the problem
  • Document findings, actions, and outcomes
  • Re-establish a new theory or escalate
  • Implement preventative measures

Answer : Re-establish a new theory or escalate

A user gets a warning from their ISP about illegally downloading copyrighted movies. The userinsists that they did not download any movies and calls a technician to implement stronger smalloffice home office (SOHO) security. Which of the following will allow only known workstations toconnect to the SOHO router?

Options are :

  • WPA password
  • WEP password
  • MAC filtering
  • Static IPs

Answer : MAC filtering

In a SOHO wireless network, which of the following prevents unauthorized users from accessingconfidential data?

Options are :

  • Enable MAC filtering
  • Change SSID name
  • Set encryption
  • Reduce broadcast power

Answer : Set encryption

CompTIA Security+ SY0 401 Test Set 1

A user has setup a SOHO and needs to implement a network configuration that allows for sharingof devices and files across the network without the complexity of a centralized server. Which of thefollowing would be MOST appropriate?

Options are :

  • WAN
  • PAN
  • Domain
  • WorkGroup

Answer : WorkGroup

After being infected with a virus, a user’s computer does not recognize the user as having localadministrator rights to the computer. After troubleshooting the issue, a technician determines thecomputer needs to be rebuilt and data needs to be restored from the user’s backup. Which of thefollowing tools would BEST reset the computer to how it worked when first purchased?

Options are :

  • Anti-malware software
  • System Restore
  • Factory restore CD
  • Recovery Console

Answer : Factory restore CD

An unauthorized user observing system security procedures is known as:

Options are :

  • Spyware.
  • Phishing.
  • A worm.
  • Shoulder surfing.

Answer : Shoulder surfing.

CompTIA SY0-401 Security Certification Practice Exam Set 1

Which of the following scenarios BEST defines phishing?

Options are :

  • A user receives a message about unwanted activity from their antivirus asking to remove the suspect file.
  • A user receives a pop-up message about a virus from a company that states that if they buy this product it will remove the virus.
  • A user receives an email from a friend to download a picture but the file format ends in .exe.
  • A user receives an email from a person in another country with a story as to why they need help with a financial arrangement.

Answer : A user receives an email from a person in another country with a story as to why they need help with a financial arrangement.

A technician recently setup a new wired network and wants to ensure only their computers canuse it. Which of the following is the MOST secure way to accomplish this?

Options are :

  • Make sure the computers are using strong passwords.
  • Assign the computers static IP addresses.
  • Disable the extra ports on the router.
  • Enable an intrusion detection system.

Answer : Disable the extra ports on the router.

Which of the following security threats involve shoulder surfing and phone phishing?

Options are :

  • Spyware
  • Social engineering
  • Trojan virus
  • Man-in-the-Middle

Answer : Social engineering

HT0-201 CEA- CompTIA DHTI+ Certification Practice Exam Set 1

A user wants to quickly install the most recent security patch released. Which of the followingoptions can be selected from the Windows Update website?

Options are :

  • Automatic settings
  • Express settings
  • Advanced settings
  • Custom settings

Answer : Express settings

For any given 802.11n wireless Internet signal, which of the following is needed to establish aconnection?

Options are :

  • Proper SSID
  • MAC address filtering
  • SSL certificate
  • Windows password

Answer : Proper SSID

Which of the following user accounts should be disabled to adhere to security best practices?

Options are :

  • Standard user
  • Administrator
  • Guest
  • Power user

Answer : Guest

CompTIA Network+ (N10-007)

Which of the following is a security threat that uses email to trick users?

Options are :

  • Phishing
  • Spyware
  • Virus
  • Shoulder surfing

Answer : Phishing

Which of the following can enable a technician to remove a virus that prevents users fromupdating their antivirus software?

Options are :

  • Safe mode
  • Recovery console

Answer : Safe mode

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions