220-802 CompTIA A+ Certification Practice Exam Set 8

The benefit of MAC filtering in wireless networking is that the network:


Options are :

  • is not visible.
  • uses static IP addresses.
  • is encrypted.
  • is more secure. (Correct)

Answer : is more secure.

CompTIA JK0-801 A+ Certification Practical Exam Set 5

Which of the following security threats requires the attacker to be physically located near the targetmachine?


Options are :

  • Phishing
  • Shoulder surfing (Correct)
  • Rootkit
  • Social engineering

Answer : Shoulder surfing

Browser redirection is caused by which of the following types of viruses?


Options are :

  • Keylogger
  • Trojan
  • Worm
  • Hijack (Correct)

Answer : Hijack

Which of the following security best practices would prevent a program on a CD from immediatelylaunching when inserted into a computer?


Options are :

  • Restrict user permissions
  • Disable the Guest account
  • MSCONFIG >Startup Tab
  • Rename the Administrator account
  • Disable autorun (Correct)

Answer : Disable autorun

SY0-401 CompTIA Security+ Certification Practice Exam Set 3

Which of the following allows a user to reset their password with a series of security questions thatonly the user should know?


Options are :

  • Administration
  • Authentication (Correct)
  • Verification
  • Permission propagation

Answer : Authentication

Which of the following would be the BEST way to combat social engineering?


Options are :

  • Badges
  • Deny social networks through the firewall
  • User education (Correct)
  • Strong password usage

Answer : User education

Which of the following is solely designed to avoid detection by an antivirus program by using theunderlying operating system to its advantage?


Options are :

  • Rootkit (Correct)
  • Virus
  • Worm
  • Trojan

Answer : Rootkit

JK0-017 CompTIA E2C Project+ Certification Practice Exam Set 5

A user reports that every time they use a search engine and click on a link to go to a website, theyinstead are taken to a site blocked by their company’s content filter. The user is not trying to go tothe blocked site and needs to be able to successfully use the search engine to complete theirassignment. Which of the following tools would a technician use to BEST resolve this issue?


Options are :

  • Recovery console
  • System restore
  • Anti-malware software (Correct)
  • Factory pre-installation

Answer : Anti-malware software

Which of the following are examples of physical security? (Select TWO).A. BadgesB. Anti-virusC. EncryptionD. FirewallsE. Locked doors


Options are :

  • B,C
  • A,B
  • A,E (Correct)
  • D,E

Answer : A,E

A technician is trying to setup a non-domain user account on a workstation, but receives thefollowing error message “Password does not meet the complexity requirements.” Which of thefollowing utilities should the technician use to identify the criteria?


Options are :

  • Performance Monitor
  • MSCONFIG
  • Users and Groups
  • Local Security Policy (Correct)

Answer : Local Security Policy

JK0-017 CompTIA E2C Project+ Certification Practice Exam Set 1

Turnstiles and other mantraps will prevent which of the following security threats?


Options are :

  • Viruses
  • Shoulder surfing
  • Tailgating (Correct)
  • Rootkits

Answer : Tailgating

A technician would like to limit computer access to certain users. Which of the following should beconfigured?


Options are :

  • Advanced security
  • Local security policy (Correct)
  • Boot.ini file
  • System configuration

Answer : Local security policy

Which of the following can be achieved with Group Policy to help with workstation securitymeasures?


Options are :

  • BitLocker password
  • BIOS password
  • Complexity requirements (Correct)
  • Wake on LAN

Answer : Complexity requirements

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 10

Which of the following user accounts should be renamed to adhere to security best practices?


Options are :

  • Guest
  • Standard user
  • Power user
  • Administrator (Correct)

Answer : Administrator

Which of the following security concepts establishes the notion that a user should only be givensufficient access to the resources they need to perform their job function?


Options are :

  • Least privilege (Correct)
  • Most privilege
  • Allow all
  • Deny all

Answer : Least privilege

An Internet browser’s cookie could be classified as which of the following?


Options are :

  • Malware
  • Rootkit
  • Spyware (Correct)
  • Phishing

Answer : Spyware

CompTIA Network+ (N10-007) : 6 Practice Exams - 2019 Set 1

Which of the following security threats do shredders help prevent?


Options are :

  • Phishing
  • Dumpster diving (Correct)
  • Malware
  • Worms

Answer : Dumpster diving

A pest exterminator tries to gain access to a company’s computer lab, but the receptionist doesnot see an extermination scheduled on the calendar and denies the exterminator access to thelab. Which of the following security threats almost occurred?


Options are :

  • Phishing
  • Shoulder surfing
  • Social engineering (Correct)
  • War driving

Answer : Social engineering

A technician is configuring a PC that will have confidential information stored on it. To ensure thatonly authorized users can access this PC, which of the following should the technician do? (SelectTWO).A. Disable the guest accountB. Install antivirus applicationsC. Disable DHCPD. Change the SSIDE. Change the default username


Options are :

  • C,D
  • A,B
  • B,C
  • A,E (Correct)

Answer : A,E

JK0-802 CompTIA A+ Certification Exam Set 4

Which of the following has the HIGHEST level rights?


Options are :

  • Remote Desktop User
  • Standard User
  • Power User (Correct)
  • Guest User

Answer : Power User

A user regularly has to walk away from their computer and is worried someone may access theirworkstation. Which of the following would BEST prevent this?


Options are :

  • Set the screensaver password
  • Lock the workstation (Correct)
  • Logon using the unprivileged guest account
  • Shutdown the computer

Answer : Lock the workstation

A user receives a phone call from a person claiming to be from technical support. This personknows the user’s name and that the user has Windows installed on their computer. The techniciandirects the user to open Event Viewer and look at some event log entries to demonstrate theeffects of a virus on the computer. The technician also asks the user for their user ID andpassword so that they can clean the computer. This is an example of which of the followingsecurity threats?


Options are :

  • Virus
  • Malware
  • Phishing
  • Social engineering (Correct)

Answer : Social engineering

CompTIA Network+ (N10-007) 6 Practice Exams and Simulations Set 6

Which of the following security controls would be an example of the least privilege principle on ahome PC?


Options are :

  • Store all financial data in a separate folder.
  • Install antispyware on the PC.
  • Disable the firewall for online gaming.
  • Create a standard user account for kids. (Correct)

Answer : Create a standard user account for kids.

A company is experiencing issues with third parties tailgating authorized users during entry tosecure server rooms. Which of the following would BEST alleviate this problem?


Options are :

  • Retinal scanners
  • Smart card badges
  • Mantraps (Correct)
  • Door locks

Answer : Mantraps

Phishing is:


Options are :

  • An infection that causes a web browser to go to a different site than the one intended from a search result page.
  • A technique used to obtain financial information from a user mimicking a legitimate website. (Correct)
  • An infection that causes a computer to behave erratically by playing music and launching browser windows.
  • A technique used to obtain financial information from a user by compiling information from social networks and their friends.

Answer : A technique used to obtain financial information from a user mimicking a legitimate website.

JK0-019 CompTIA E2C Network + Certification Exam Set 2

Which of the following security measures is usually found in a laptop?


Options are :

  • Bollard
  • Key fobs
  • Biometrics (Correct)
  • Hypervisor

Answer : Biometrics

A computer program that functions normally while quietly installing malicious software on amachine is known as a:


Options are :

  • Trojan. (Correct)
  • DDoS attack.
  • Phishing attack.
  • Worm.

Answer : Trojan.

When securing a new wireless router, which of the following should be changed FIRST?


Options are :

  • Default SSID
  • DHCP settings
  • Default password (Correct)
  • Radio power levels

Answer : Default password

CompTIA Security+ (SY0-501) Practice Exams with Simulations Set 3

Which of the following security threats does NOT use software to extract sensitive information orcredentials?


Options are :

  • Grayware
  • Shoulder surfing (Correct)
  • Malware
  • Man-in-the-Middle exploits

Answer : Shoulder surfing

Which of the following passwords is the MOST secure according to industry best practices?


Options are :

  • thisisthecorrectanswer1
  • E@sy2Remember (Correct)
  • VeryStrongPassword
  • SimpleAnswer1234

Answer : E@sy2Remember

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions