220-802 CompTIA A+ Certification Practice Exam Set 8

The benefit of MAC filtering in wireless networking is that the network:

Options are :

  • is not visible.
  • uses static IP addresses.
  • is encrypted.
  • is more secure. (Correct)

Answer : is more secure.

Which of the following security threats requires the attacker to be physically located near the target


Options are :

  • Phishing
  • Shoulder surfing (Correct)
  • Rootkit
  • Social engineering

Answer : Shoulder surfing

Browser redirection is caused by which of the following types of viruses?

Options are :

  • Keylogger
  • Trojan
  • Worm
  • Hijack (Correct)

Answer : Hijack

Which of the following security best practices would prevent a program on a CD from immediately

launching when inserted into a computer?

Options are :

  • Restrict user permissions
  • Disable the Guest account
  • MSCONFIG >Startup Tab
  • Rename the Administrator account
  • Disable autorun (Correct)

Answer : Disable autorun

Which of the following allows a user to reset their password with a series of security questions that

only the user should know?

Options are :

  • Administration
  • Authentication (Correct)
  • Verification
  • Permission propagation

Answer : Authentication

Which of the following would be the BEST way to combat social engineering?

Options are :

  • Badges
  • Deny social networks through the firewall
  • User education (Correct)
  • Strong password usage

Answer : User education

Which of the following is solely designed to avoid detection by an antivirus program by using the

underlying operating system to its advantage?

Options are :

  • Rootkit (Correct)
  • Virus
  • Worm
  • Trojan

Answer : Rootkit

A user reports that every time they use a search engine and click on a link to go to a website, they

instead are taken to a site blocked by their company’s content filter. The user is not trying to go to

the blocked site and needs to be able to successfully use the search engine to complete their

assignment. Which of the following tools would a technician use to BEST resolve this issue?

Options are :

  • Recovery console
  • System restore
  • Anti-malware software (Correct)
  • Factory pre-installation

Answer : Anti-malware software

Which of the following are examples of physical security? (Select TWO).

A. Badges

B. Anti-virus

C. Encryption

D. Firewalls

E. Locked doors

Options are :

  • B,C
  • A,B
  • A,E (Correct)
  • D,E

Answer : A,E

A technician is trying to setup a non-domain user account on a workstation, but receives the

following error message “Password does not meet the complexity requirements.” Which of the

following utilities should the technician use to identify the criteria?

Options are :

  • Performance Monitor
  • Users and Groups
  • Local Security Policy (Correct)

Answer : Local Security Policy

Turnstiles and other mantraps will prevent which of the following security threats?

Options are :

  • Viruses
  • Shoulder surfing
  • Tailgating (Correct)
  • Rootkits

Answer : Tailgating

A technician would like to limit computer access to certain users. Which of the following should be


Options are :

  • Advanced security
  • Local security policy (Correct)
  • Boot.ini file
  • System configuration

Answer : Local security policy

Which of the following can be achieved with Group Policy to help with workstation security


Options are :

  • BitLocker password
  • BIOS password
  • Complexity requirements (Correct)
  • Wake on LAN

Answer : Complexity requirements

Which of the following user accounts should be renamed to adhere to security best practices?

Options are :

  • Guest
  • Standard user
  • Power user
  • Administrator (Correct)

Answer : Administrator

Which of the following security concepts establishes the notion that a user should only be given

sufficient access to the resources they need to perform their job function?

Options are :

  • Least privilege (Correct)
  • Most privilege
  • Allow all
  • Deny all

Answer : Least privilege

An Internet browser’s cookie could be classified as which of the following?

Options are :

  • Malware
  • Rootkit
  • Spyware (Correct)
  • Phishing

Answer : Spyware

Which of the following security threats do shredders help prevent?

Options are :

  • Phishing
  • Dumpster diving (Correct)
  • Malware
  • Worms

Answer : Dumpster diving

A pest exterminator tries to gain access to a company’s computer lab, but the receptionist does

not see an extermination scheduled on the calendar and denies the exterminator access to the

lab. Which of the following security threats almost occurred?

Options are :

  • Phishing
  • Shoulder surfing
  • Social engineering (Correct)
  • War driving

Answer : Social engineering

A technician is configuring a PC that will have confidential information stored on it. To ensure that

only authorized users can access this PC, which of the following should the technician do? (Select


A. Disable the guest account

B. Install antivirus applications

C. Disable DHCP

D. Change the SSID

E. Change the default username

Options are :

  • C,D
  • A,B
  • B,C
  • A,E (Correct)

Answer : A,E

Which of the following has the HIGHEST level rights?

Options are :

  • Remote Desktop User
  • Standard User
  • Power User (Correct)
  • Guest User

Answer : Power User

A user regularly has to walk away from their computer and is worried someone may access their

workstation. Which of the following would BEST prevent this?

Options are :

  • Set the screensaver password
  • Lock the workstation (Correct)
  • Logon using the unprivileged guest account
  • Shutdown the computer

Answer : Lock the workstation

A user receives a phone call from a person claiming to be from technical support. This person

knows the user’s name and that the user has Windows installed on their computer. The technician

directs the user to open Event Viewer and look at some event log entries to demonstrate the

effects of a virus on the computer. The technician also asks the user for their user ID and

password so that they can clean the computer. This is an example of which of the following

security threats?

Options are :

  • Virus
  • Malware
  • Phishing
  • Social engineering (Correct)

Answer : Social engineering

Which of the following security controls would be an example of the least privilege principle on a

home PC?

Options are :

  • Store all financial data in a separate folder.
  • Install antispyware on the PC.
  • Disable the firewall for online gaming.
  • Create a standard user account for kids. (Correct)

Answer : Create a standard user account for kids.

A company is experiencing issues with third parties tailgating authorized users during entry to

secure server rooms. Which of the following would BEST alleviate this problem?

Options are :

  • Retinal scanners
  • Smart card badges
  • Mantraps (Correct)
  • Door locks

Answer : Mantraps

Phishing is:

Options are :

  • An infection that causes a web browser to go to a different site than the one intended from a search result page.
  • A technique used to obtain financial information from a user mimicking a legitimate website. (Correct)
  • An infection that causes a computer to behave erratically by playing music and launching browser windows.
  • A technique used to obtain financial information from a user by compiling information from social networks and their friends.

Answer : A technique used to obtain financial information from a user mimicking a legitimate website.

Which of the following security measures is usually found in a laptop?

Options are :

  • Bollard
  • Key fobs
  • Biometrics (Correct)
  • Hypervisor

Answer : Biometrics

A computer program that functions normally while quietly installing malicious software on a

machine is known as a:

Options are :

  • Trojan. (Correct)
  • DDoS attack.
  • Phishing attack.
  • Worm.

Answer : Trojan.

When securing a new wireless router, which of the following should be changed FIRST?

Options are :

  • Default SSID
  • DHCP settings
  • Default password (Correct)
  • Radio power levels

Answer : Default password

Which of the following security threats does NOT use software to extract sensitive information or


Options are :

  • Grayware
  • Shoulder surfing (Correct)
  • Malware
  • Man-in-the-Middle exploits

Answer : Shoulder surfing

Which of the following passwords is the MOST secure according to industry best practices?

Options are :

  • thisisthecorrectanswer1
  • E@sy2Remember (Correct)
  • VeryStrongPassword
  • SimpleAnswer1234

Answer : E@sy2Remember

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions