220-802 CompTIA A+ Certification Practice Exam Set 9

Joe, a technician, is asked to set up a wired kiosk laptop for office visitors to use for Internet

access only. Which of the following would be MOST important in securing this type of setup?


Options are :

  • Requiring personal information be entered before use
  • Setting a strong password for all kiosk accounts
  • Restricting user permissions for the kiosk account (Correct)
  • Disabling the administrator account
  • Changing the default usernames for all kiosk accounts

Answer : Restricting user permissions for the kiosk account

Which of the following provides protection against DDoS attacks?


Options are :

  • UAC
  • Antivirus
  • RFID badge
  • Firewall (Correct)

Answer : Firewall

A company has replaced all computers in their accounting department. Due to the sensitive nature

of the department, company management has decided to remove and destroy all hard drives prior

to donating the computers to a local charity. Now that the drives are removed, which of the

following is the MOST efficient method of destroying the hard drives to prevent sensitive

information from being leaked?


Options are :

  • Overwriting
  • Degaussing (Correct)
  • Drive wiping
  • Formatting

Answer : Degaussing

Which of the following would a technician use to install applications onto an iPad? (Select TWO).

A. App Store

B. Market Place

C. iTunes

D. Exchange

E. Mobile Market


Options are :

  • A,C (Correct)
  • B,C
  • A,B
  • D,E

Answer : A,C

Which of the following OS based features limits access to a workstation? (Select TWO).

A. User permissions

B. Strong passwords

C. Employee badges

D. Privacy filters

E. MAC filtering


Options are :

  • C,D
  • A,B (Correct)
  • B,C
  • D,E

Answer : A,B

When comparing laptops and tablet PCs which of the following is true?


Options are :

  • Tablets typically use solid state drives (Correct)
  • Laptops typically use touch screen displays
  • Tablets typically have higher resolution displays
  • Laptops typically have a longer battery life

Answer : Tablets typically use solid state drives

Which of the following mobile device sync methods is easiest for the end user but requires more

configuration on the part of the technician?


Options are :

  • Encrypted wired sync
  • Wired sync
  • Dock sync
  • Wireless sync (Correct)

Answer : Wireless sync

Which of the following software types would need to be installed on a mobile device to help

prevent data from being viewed if the device is lost?


Options are :

  • Remote wipe (Correct)
  • Antivirus
  • Remote backup application
  • GPS locator

Answer : Remote wipe

A SOHO network with nine workstations all connected to a switch is located in a room that visitors

can enter. A technician wants to make the network secure from visitors. Which of the following

would be the BEST solution?


Options are :

  • Disable all unused ports on the switch (Correct)
  • Create strong network usernames and passwords
  • Ask administration to label the room off limits to visitors
  • Enable QoS settings

Answer : Disable all unused ports on the switch

Which of the following BEST describes the Apple utility used with iOS devices to synchronize,

upgrade, and restore to factory default if needed?


Options are :

  • Safari
  • iMac
  • Bluetooth
  • iTunes (Correct)

Answer : iTunes

Which of the following mobile device features disables cellular and wireless communication?


Options are :

  • Pairing Mode
  • Airplane Mode (Correct)
  • Settings Reset
  • Hotspot Mode

Answer : Airplane Mode

A user has a laptop that they need to get ready for an outdoor presentation. The user is concerned

that the laptop will turn off the screen or go into standby before their presentation is complete.

Which of the following Control Panel paths should the technician use in order to prevent this from

occurring?


Options are :

  • System -> Advanced -> Performance
  • Power Options -> Hibernate
  • System -> Hardware
  • Power Options -> Power Schemes (Correct)

Answer : Power Options -> Power Schemes

Which of the following is typically the MOST difficult security threat to remove?


Options are :

  • Trojan
  • Rootkit (Correct)
  • Virus
  • Spyware

Answer : Rootkit

Which of the following types of physical security features a passcode generated from an

algorithm?


Options are :

  • RFID Badge
  • RSA Token (Correct)
  • Biometrics
  • Key Fob

Answer : RSA Token

A user wants to prevent access to specific websites to prevent their children from accidently

accessing them. Which of the following can be implemented?


Options are :

  • Antispyware software
  • A firewall (Correct)
  • Antivirus software
  • A switch

Answer : A firewall

A user states they constantly get pop-ups on their workstations asking them to buy a product.

Which of the following is this known as?


Options are :

  • Malware (Correct)
  • Shoulder surfing
  • Social engineering
  • Phishing

Answer : Malware

A user is concerned about an issue with iOS. The user MOST likely has which of the following

devices?


Options are :

  • Android Phone
  • iPhone (Correct)
  • iCloud
  • Windows Tablet

Answer : iPhone

A website that attempts to mimic a bank website with malicious intent is known as which of the

following?


Options are :

  • Malware
  • Phishing (Correct)
  • Social engineering
  • Shoulder surfing

Answer : Phishing

Which of the following is the MOST secure method, short of physical destruction, that would be

used to ensure that data on a hard drive cannot be recovered?


Options are :

  • Format the drive
  • Repartition the drive
  • Use a degaussing tool
  • Use an overwrite program (Correct)

Answer : Use an overwrite program

A technician is tasked with implementing the principle of least privilege to secure a file server so

that only authorized users can modify company documents. Which of the following should the

technician implement to comply with the request?


Options are :

  • Create a folder hierarchy, disable inheritance and assign user's permissions to specific folders. (Correct)
  • Create a shared folder and grant full administrative rights only to the users who need to modify company documents.
  • Create a shared folder and only provide read access to all users regardless of their role.
  • Create a folder tree hierarchy, enable inheritance and assign user's permissions to specific folders.

Answer : Create a folder hierarchy, disable inheritance and assign user's permissions to specific folders.

A home user has forgotten their password and cannot log into their Windows XP Home PC. They

do not want to lose any information. Which of the following should be used FIRST, assuming that

the user had set up the PC?


Options are :

  • Use third party software to change password
  • Restart in safe mode and log in as administrator (Correct)
  • Re-install the OS from the resource CD
  • Log in as administrator from start up screen

Answer : Restart in safe mode and log in as administrator

Laptops and tablets have which of the following in common?


Options are :

  • Solid state drives (Correct)
  • Not upgradable
  • Contain an accelerometer
  • No field serviceable parts

Answer : Solid state drives

While configuring a new email application that uses POP3 for a customer, the technician

determines the firewall is blocking the traffic. Which of the following ports should be opened to

allow POP3 mail traffic through the firewall?


Options are :

  • 443
  • 53
  • 110 (Correct)
  • 3389

Answer : 110

Which of the following are characteristics of a strong password? (Select TWO).

A. Hard to guess.

B. Cannot be reversed.

C. Uses dictionary words.

D. Uses special characters.

E. Can be encrypted.


Options are :

  • C,E
  • A,B
  • C,D
  • A,D (Correct)

Answer : A,D

By disabling DHCP and allowing only static IP address assignments, which of the following will

occur? (Select TWO).

A. The domain controller will require additional RAM

B. Devices without static IP addresses cannot connect to the network

C. IP address assignments will be consistent over time

D. Crosstalk will be reduced on the network

E. Network traffic and congestion will increase over time

F. A gateway will be required for every Ethernet port


Options are :

  • E,F
  • B,C (Correct)
  • C,D
  • A,B

Answer : B,C

A customer reports that their wireless laptop cannot connect after removing it from its carrying

case. The laptop boots and the user is able to log in. Which of the following should be checked

FIRST?


Options are :

  • External antenna switch (Correct)
  • Status in Device Manager
  • Available hard drive space
  • Laptop battery levels

Answer : External antenna switch

A user installed a new SOHO router and new wireless NICs to increase their transmission speed

from 802.11b to 802.11g with the manufacturer's default settings. The user lives in an apartmentbuilding and is still experiencing slowness to the Internet after the installations. Which of the

following is the MOST secure option that a technician could implement to resolve this issue?


Options are :

  • Assign static IP addresses
  • Disable the WAN port
  • Enable MAC filtering (Correct)
  • Hide the SSID

Answer : Enable MAC filtering

Joe, a user, reports that random pages are being printed on his printer. Which of the following can

mitigate this from occurring?


Options are :

  • Change the network frequency
  • Enable static IP's
  • Change the default encryption key (Correct)
  • Disable the SSID broadcasting

Answer : Change the default encryption key

A user just bought an Android tablet and wants to connect to their work email. The users

employer has a Microsoft Exchange server for email. Which of the following would the technicianconfigure to allow the user to access email on the Android tablet?


Options are :

  • POP3, SMTP (Correct)
  • Devices are incompatible
  • IMAP, SNTP
  • DNS, DHCP

Answer : POP3, SMTP

A user has not received any new emails on their smartphone in the last two days. The user is able

to access the Internet without any problems. Which of the following should the user do FIRST?


Options are :

  • Reconfigure the smartphone email account
  • Restart the smartphone (Correct)
  • Update the operating system
  • Resynchronize the smart phone

Answer : Restart the smartphone

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions