220-802 CompTIA A+ Certification Practice Exam Set 7

A technician is installing a webcam in a nursery for a user to monitor their baby. The user wants to

ensure that the webcam is not broadcasting externally. Which of the following would the technician

implement on the SOHO router to prevent the broadcast?

Options are :

  • Change the default SSID
  • Block the outbound port (Correct)
  • Enable static IPs
  • Enable MAC filtering

Answer : Block the outbound port

Which of the following should a technician do LAST after cleaning up a virus infection?

Options are :

  • Educate the end user (Correct)
  • Enable system restore and create restore point
  • Schedule scans and updates
  • Update antivirus software

Answer : Educate the end user

When securing a small office home office (SOHO) that has empty cubicles with unused network

ports, which of the following can be used to secure ONLY the unused ports?

Options are :

  • Disable DNS on the network.
  • Power down the router when it is not being used.
  • Disable the ports on the router or switch. (Correct)
  • Use DHCP addressing on the network.

Answer : Disable the ports on the router or switch.

Which of the following features helps to prevent shoulder surfing?

Options are :

  • Privacy screen (Correct)
  • Auto adjust
  • Degaussing
  • Native resolution

Answer : Privacy screen

Which of the following security threats is BEST mitigated through proper user training?

Options are :

  • Social Engineering (Correct)
  • Browser Adware
  • Rootkits
  • A Worm

Answer : Social Engineering

The practice of following an authorized person through an entrance without using a badge to

defeat security is called:

Options are :

  • phishing
  • spamming
  • shredding
  • tailgating (Correct)

Answer : tailgating

A user has a perimeter firewall and up-to-date antivirus software. The user is asking what else

they can do to improve their security. Which of the following will have the MOST impact on

network security? (Select TWO).

A. Install additional antivirus software

B. Disable screen savers

C. Conduct a daily security audit

D. Assign security rights based on job roles

E. Use strong passwords

Options are :

  • D,E (Correct)
  • B,C
  • C,D
  • A,B

Answer : D,E

A user has just purchased a wireless router for their home. Which of the following should be done

to BEST secure the router from unauthorized access? (Select TWO).

A. Change router default logins

B. Change the security settings on their computer

C. Set encryption on the router

D. Update router firmware

E. Change the encryption on the computerís wireless adapter

Options are :

  • B,C
  • A,B
  • A,C (Correct)
  • D,E

Answer : A,C

A user does not want their kids to be able to install software on their home desktop. Which of the

following types of accounts should the user set up in Windows 7?

Options are :

  • Remote Desktop Users
  • Standard (Correct)
  • Power User
  • Administrator

Answer : Standard

A client has a computer that is infected with several viruses and spyware. Which of the following

should the technician perform FIRST before spyware removal?

Options are :

  • Disable system restore (Correct)
  • Disable network cards
  • Run Windows Update
  • Run the chkdsk /r command

Answer : Disable system restore

A technician has installed the hardware for a SOHO wired network. Which of the following is theFIRST step to securing the network?

Options are :

  • Change default usernames and passwords (Correct)
  • Disable unused ports
  • Enable MAC filtering
  • Assign static IP addresses

Answer : Change default usernames and passwords

Which of the following encryption standards is found on older wireless devices and provides

minimal security?

Options are :

  • AES
  • WEP (Correct)
  • WPA
  • WPA2

Answer : WEP

Which of the following is BEST used to prevent other people from viewing a userís computer


Options are :

  • Privacy filter (Correct)
  • Anti-virus software
  • Biometric device
  • Key fob

Answer : Privacy filter

Which of the following common security threats could be occurring when a user calls and requestsWhich of the following common security threats could be occurring when a user calls and requests

Options are :

  • Shoulder surfing
  • Spyware
  • Social engineering (Correct)
  • Phishing

Answer : Social engineering

A technician needs to change the minimum password length to 8 characters to make it more

secure. Which of the following system settings should the technician configure?

Options are :

  • System Configuration
  • Local Security Policy (Correct)
  • Windows Security Center
  • Windows Firewall

Answer : Local Security Policy

Which of the following is considered a method of physical security?

Options are :

  • Cipher locked doors (Correct)
  • Firewall
  • NTFS
  • Strong passwords

Answer : Cipher locked doors

A user is experiencing slow performance with their computer. A technician suspects the computer

has a virus and runs antivirus software. A virus is found and removed, but the performance issue

is not resolved. Which of the following should the technician perform NEXT?

Options are :

  • Establish a plan of action to resolve the problem
  • Document findings, actions, and outcomes
  • Re-establish a new theory or escalate (Correct)
  • Implement preventative measures

Answer : Re-establish a new theory or escalate

A user gets a warning from their ISP about illegally downloading copyrighted movies. The user

insists that they did not download any movies and calls a technician to implement stronger small

office home office (SOHO) security. Which of the following will allow only known workstations to

connect to the SOHO router?

Options are :

  • WPA password
  • WEP password
  • MAC filtering (Correct)
  • Static IPs

Answer : MAC filtering

In a SOHO wireless network, which of the following prevents unauthorized users from accessing

confidential data?

Options are :

  • Enable MAC filtering
  • Change SSID name
  • Set encryption (Correct)
  • Reduce broadcast power

Answer : Set encryption

A user has setup a SOHO and needs to implement a network configuration that allows for sharing

of devices and files across the network without the complexity of a centralized server. Which of the

following would be MOST appropriate?

Options are :

  • WAN
  • PAN
  • Domain
  • WorkGroup (Correct)

Answer : WorkGroup

After being infected with a virus, a userís computer does not recognize the user as having local

administrator rights to the computer. After troubleshooting the issue, a technician determines the

computer needs to be rebuilt and data needs to be restored from the userís backup. Which of the

following tools would BEST reset the computer to how it worked when first purchased?

Options are :

  • Anti-malware software
  • System Restore
  • Factory restore CD (Correct)
  • Recovery Console

Answer : Factory restore CD

An unauthorized user observing system security procedures is known as:

Options are :

  • Spyware.
  • Phishing.
  • A worm.
  • Shoulder surfing. (Correct)

Answer : Shoulder surfing.

Which of the following scenarios BEST defines phishing?

Options are :

  • A user receives a message about unwanted activity from their antivirus asking to remove the suspect file.
  • A user receives a pop-up message about a virus from a company that states that if they buy this product it will remove the virus.
  • A user receives an email from a friend to download a picture but the file format ends in .exe.
  • A user receives an email from a person in another country with a story as to why they need help with a financial arrangement. (Correct)

Answer : A user receives an email from a person in another country with a story as to why they need help with a financial arrangement.

A technician recently setup a new wired network and wants to ensure only their computers can

use it. Which of the following is the MOST secure way to accomplish this?

Options are :

  • Make sure the computers are using strong passwords.
  • Assign the computers static IP addresses.
  • Disable the extra ports on the router. (Correct)
  • Enable an intrusion detection system.

Answer : Disable the extra ports on the router.

Which of the following security threats involve shoulder surfing and phone phishing?

Options are :

  • Spyware
  • Social engineering (Correct)
  • Trojan virus
  • Man-in-the-Middle

Answer : Social engineering

A user wants to quickly install the most recent security patch released. Which of the following

options can be selected from the Windows Update website?

Options are :

  • Automatic settings
  • Express settings (Correct)
  • Advanced settings
  • Custom settings

Answer : Express settings

For any given 802.11n wireless Internet signal, which of the following is needed to establish a


Options are :

  • Proper SSID (Correct)
  • MAC address filtering
  • SSL certificate
  • Windows password

Answer : Proper SSID

Which of the following user accounts should be disabled to adhere to security best practices?

Options are :

  • Standard user
  • Administrator
  • Guest (Correct)
  • Power user

Answer : Guest

Which of the following is a security threat that uses email to trick users?

Options are :

  • Phishing (Correct)
  • Spyware
  • Virus
  • Shoulder surfing

Answer : Phishing

Which of the following can enable a technician to remove a virus that prevents users from

updating their antivirus software?

Options are :

  • Safe mode (Correct)
  • Recovery console

Answer : Safe mode

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions