JK0-802 CompTIA A+ Certification Exam Set 11

Which of the following can enable a technician to remove a virus that prevents users from updating their antivirus software?

Options are :

  • Recovery console
  • Safe mode (Correct)

Answer : Safe mode

SK0-004 CompTIA Server+ Certification Practice Exam Set 9

A company recently had a security breach and is now required to increase the security on their workstations. A technician has been tasked to harden all the workstations on the network. Which of the following should the technician do?

Options are :

  • Enable Windows automatic updates
  • Enable wireless encryption
  • Enable MAC filtering
  • Enable screensaver required passwords (Correct)

Answer : Enable screensaver required passwords

Which of the following security threats requires the attacker to be physically located near the target machine?

Options are :

  • Phishing
  • Rootkit
  • Shoulder surfing (Correct)
  • Social engineering

Answer : Shoulder surfing

An Internet browserís cookie could be classified as which of the following?

Options are :

  • Malware
  • Phishing
  • Rootkit
  • Spyware (Correct)

Answer : Spyware

SY0-401 CompTIA Security+ Certification Practice Exam Set 3

In a SOHO wireless network, which of the following prevents unauthorized users from accessing confidential data?

Options are :

  • Enable MAC filtering
  • Reduce broadcast power
  • Change SSID name
  • Set encryption (Correct)

Answer : Set encryption

Which of the following common security threats could be occurring when a user calls and requests his co-workerís password?

Options are :

  • Phishing
  • Shoulder surfing
  • Social engineering (Correct)
  • Spyware

Answer : Social engineering

A client has a computer that is infected with several viruses and spyware. Which of the following should the technician perform FIRST before spyware removal?

Options are :

  • Run Windows Update
  • Disable system restore (Correct)
  • Run the chkdsk /r command
  • Disable network cards

Answer : Disable system restore

CompTIA JK0-015 E2C Security+ Certification Practice Test Set 25

Which of the following is solely designed to avoid detection by an antivirus program by using the underlying operating system to its advantage?

Options are :

  • Rootkit (Correct)
  • Worm
  • Virus
  • Trojan

Answer : Rootkit

Which of the following security threats do shredders help prevent?

Options are :

  • Dumpster diving (Correct)
  • Worms
  • Phishing
  • Malware

Answer : Dumpster diving

The practice of following an authorized person through an entrance without using a badge to defeat security is called:

Options are :

  • phishing
  • shredding
  • tailgating (Correct)
  • spamming

Answer : tailgating

CV0-001 CompTIA Cloud+ Certification Practice Exam Set 7

A technician would like to limit computer access to certain users. Which of the following should be configured?

Options are :

  • Boot.ini file
  • System configuration
  • Local security policy (Correct)
  • Advanced security

Answer : Local security policy

Which of the following is a security threat that uses email to trick users?

Options are :

  • Virus
  • Shoulder surfing
  • Phishing (Correct)
  • Spyware

Answer : Phishing

Which of the following security concepts establishes the notion that a user should only be given sufficient access to the resources they need to perform their job function?

Options are :

  • Deny all
  • Most privilege
  • Allow all
  • Least privilege (Correct)

Answer : Least privilege

SK0-004 CompTIA Server+ Certification Practice Exam Set 1

A technician is configuring a PC that will have confidential information stored on it. To ensure that only authorized users can access this PC, which of the following should the technician do? (Select TWO).A. Disable the guest accountB. Install antivirus applicationsC. Disable DHCPD. Change the SSIDE. Change the default username

Options are :

  • A,B
  • A,E (Correct)
  • D,E
  • B,C

Answer : A,E

A pest exterminator tries to gain access to a companyís computer lab, but the receptionist does not see an extermination scheduled on the calendar and denies the exterminator access to the lab. Which of the following security threats almost occurred?

Options are :

  • Shoulder surfing
  • Social engineering (Correct)
  • Phishing
  • War driving

Answer : Social engineering

A user has just purchased a wireless router for their home. Which of the following should be done to BEST secure the router from unauthorized access? (Select TWO).A. Change router default loginsB. Change the security settings on their computerC. Set encryption on the routerD. Update router firmwareE. Change the encryption on the computerís wireless adapter

Options are :

  • B,E
  • C,D
  • D,E
  • A,C (Correct)

Answer : A,C

HT0-201 CEA- CompTIA DHTI+ Certification Practice Exam Set 2

A user has setup a SOHO and needs to implement a network configuration that allows for sharing of devices and files across the network without the complexity of a centralized server. Which of the following would be MOST appropriate?

Options are :

  • WorkGroup (Correct)
  • PAN
  • Domain
  • WAN

Answer : WorkGroup

Browser redirection is caused by which of the following types of viruses?

Options are :

  • Keylogger
  • Worm
  • Trojan
  • Hijack (Correct)

Answer : Hijack

Which of the following security best practices would prevent a program on a CD from immediately launching when inserted into a computer?

Options are :

  • Disable the Guest account
  • MSCONFIG >Startup Tab
  • Disable autorun (Correct)
  • Rename the Administrator account

Answer : Disable autorun

SK0-004 CompTIA Server+ Certification Practice Exam Set 3

Which of the following security threats does NOT use software to extract sensitive information or credentials?

Options are :

  • Grayware
  • Shoulder surfing (Correct)
  • Malware
  • Man-in-the-Middle exploits

Answer : Shoulder surfing

A technician needs to change the minimum password length to 8 characters to make it more secure. Which of the following system settings should the technician configure?

Options are :

  • Local Security Policy (Correct)
  • Windows Security Center
  • System Configuration
  • Windows Firewall

Answer : Local Security Policy

A user does not want their kids to be able to install software on their home desktop. Which of the following types of accounts should the user set up in Windows 7?

Options are :

  • Administrator
  • Power User
  • Standard (Correct)
  • Remote Desktop Users

Answer : Standard

CompTIA JK0-022 E2C Security+ Compliance & Operational Exam Set 8

The benefit of MAC filtering in wireless networking is that the network:

Options are :

  • is encrypted.
  • is not visible.
  • is more secure. (Correct)
  • uses static IP addresses.

Answer : is more secure.

When securing a small office home office (SOHO) that has empty cubicles with unused network ports, which of the following can be used to secure ONLY the unused ports?

Options are :

  • Power down the router when it is not being used.
  • Disable the ports on the router or switch. (Correct)
  • Disable DNS on the network
  • Use DHCP addressing on the network.

Answer : Disable the ports on the router or switch.

Which of the following is BEST used to prevent other people from viewing a userís computer screen?

Options are :

  • Biometric device
  • Anti-virus software
  • Key fob
  • Privacy filter (Correct)

Answer : Privacy filter

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 29

After being infected with a virus, a userís computer does not recognize the user as having local administrator rights to the computer. After troubleshooting the issue, a technician determines the computer needs to be rebuilt and data needs to be restored from the userís backup. Which of the following tools would BEST reset the computer to how it worked when first purchased?

Options are :

  • Recovery Console
  • System Restore
  • Anti-malware software
  • Factory restore CD (Correct)

Answer : Factory restore CD

Which of the following encryption standards is found on older wireless devices and provides minimal security?

Options are :

  • AES
  • WPA
  • WEP (Correct)
  • WPA2

Answer : WEP

Which of the following security threats involve shoulder surfing and phone phishing?

Options are :

  • Man-in-the-Middle
  • Social engineering (Correct)
  • Trojan virus
  • Spyware

Answer : Social engineering

Mock : CompTIA CySA+ (CS0-001)

A company is experiencing issues with third parties tailgating authorized users during entry to secure server rooms. Which of the following would BEST alleviate this problem?

Options are :

  • Retinal scanners
  • Mantraps (Correct)
  • Smart card badges
  • Door locks

Answer : Mantraps

A computer program that functions normally while quietly installing malicious software on a machine is known as a:

Options are :

  • DDoS attack.
  • Worm.
  • Phishing attack.
  • Trojan. (Correct)

Answer : Trojan.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions