JK0-802 CompTIA A+ Certification Exam Set 11

Which of the following can enable a technician to remove a virus that prevents users from updating their antivirus software?


Options are :

  • MSCONFIG
  • REGEDIT
  • Recovery console
  • Safe mode (Correct)

Answer : Safe mode

A company recently had a security breach and is now required to increase the security on their workstations. A technician has been tasked to harden all the workstations on the network. Which of the following should the technician do?


Options are :

  • Enable Windows automatic updates
  • Enable wireless encryption
  • Enable MAC filtering
  • Enable screensaver required passwords (Correct)

Answer : Enable screensaver required passwords

Which of the following security threats requires the attacker to be physically located near the target machine?


Options are :

  • Phishing
  • Rootkit
  • Shoulder surfing (Correct)
  • Social engineering

Answer : Shoulder surfing

An Internet browserís cookie could be classified as which of the following?


Options are :

  • Malware
  • Phishing
  • Rootkit
  • Spyware (Correct)

Answer : Spyware

In a SOHO wireless network, which of the following prevents unauthorized users from accessing confidential data?


Options are :

  • Enable MAC filtering
  • Reduce broadcast power
  • Change SSID name
  • Set encryption (Correct)

Answer : Set encryption

Which of the following common security threats could be occurring when a user calls and requests his co-workerís password?


Options are :

  • Phishing
  • Shoulder surfing
  • Social engineering (Correct)
  • Spyware

Answer : Social engineering

A client has a computer that is infected with several viruses and spyware. Which of the following should the technician perform FIRST before spyware removal?


Options are :

  • Run Windows Update
  • Disable system restore (Correct)
  • Run the chkdsk /r command
  • Disable network cards

Answer : Disable system restore

Which of the following is solely designed to avoid detection by an antivirus program by using the underlying operating system to its advantage?


Options are :

  • Rootkit (Correct)
  • Worm
  • Virus
  • Trojan

Answer : Rootkit

Which of the following security threats do shredders help prevent?


Options are :

  • Dumpster diving (Correct)
  • Worms
  • Phishing
  • Malware

Answer : Dumpster diving

The practice of following an authorized person through an entrance without using a badge to defeat security is called:


Options are :

  • phishing
  • shredding
  • tailgating (Correct)
  • spamming

Answer : tailgating

A technician would like to limit computer access to certain users. Which of the following should be configured?


Options are :

  • Boot.ini file
  • System configuration
  • Local security policy (Correct)
  • Advanced security

Answer : Local security policy

Which of the following is a security threat that uses email to trick users?


Options are :

  • Virus
  • Shoulder surfing
  • Phishing (Correct)
  • Spyware

Answer : Phishing

Which of the following security concepts establishes the notion that a user should only be given sufficient access to the resources they need to perform their job function?


Options are :

  • Deny all
  • Most privilege
  • Allow all
  • Least privilege (Correct)

Answer : Least privilege

A technician is configuring a PC that will have confidential information stored on it. To ensure that only authorized users can access this PC, which of the following should the technician do? (Select TWO).

A. Disable the guest account

B. Install antivirus applications

C. Disable DHCP

D. Change the SSID

E. Change the default username


Options are :

  • A,B
  • A,E (Correct)
  • D,E
  • B,C

Answer : A,E

A pest exterminator tries to gain access to a companyís computer lab, but the receptionist does not see an extermination scheduled on the calendar and denies the exterminator access to the lab. Which of the following security threats almost occurred?


Options are :

  • Shoulder surfing
  • Social engineering (Correct)
  • Phishing
  • War driving

Answer : Social engineering

A user has just purchased a wireless router for their home. Which of the following should be done to BEST secure the router from unauthorized access? (Select TWO).

A. Change router default logins

B. Change the security settings on their computer

C. Set encryption on the router

D. Update router firmware

E. Change the encryption on the computerís wireless adapter


Options are :

  • B,E
  • C,D
  • D,E
  • A,C (Correct)

Answer : A,C

A user has setup a SOHO and needs to implement a network configuration that allows for sharing of devices and files across the network without the complexity of a centralized server. Which of the following would be MOST appropriate?


Options are :

  • WorkGroup (Correct)
  • PAN
  • Domain
  • WAN

Answer : WorkGroup

Browser redirection is caused by which of the following types of viruses?


Options are :

  • Keylogger
  • Worm
  • Trojan
  • Hijack (Correct)

Answer : Hijack

Which of the following security best practices would prevent a program on a CD from immediately launching when inserted into a computer?


Options are :

  • Disable the Guest account
  • MSCONFIG >Startup Tab
  • Disable autorun (Correct)
  • Rename the Administrator account

Answer : Disable autorun

Which of the following security threats does NOT use software to extract sensitive information or credentials?


Options are :

  • Grayware
  • Shoulder surfing (Correct)
  • Malware
  • Man-in-the-Middle exploits

Answer : Shoulder surfing

A technician needs to change the minimum password length to 8 characters to make it more secure. Which of the following system settings should the technician configure?


Options are :

  • Local Security Policy (Correct)
  • Windows Security Center
  • System Configuration
  • Windows Firewall

Answer : Local Security Policy

A user does not want their kids to be able to install software on their home desktop. Which of the following types of accounts should the user set up in Windows 7?


Options are :

  • Administrator
  • Power User
  • Standard (Correct)
  • Remote Desktop Users

Answer : Standard

The benefit of MAC filtering in wireless networking is that the network:


Options are :

  • is encrypted.
  • is not visible.
  • is more secure. (Correct)
  • uses static IP addresses.

Answer : is more secure.

When securing a small office home office (SOHO) that has empty cubicles with unused network ports, which of the following can be used to secure ONLY the unused ports?


Options are :

  • Power down the router when it is not being used.
  • Disable the ports on the router or switch. (Correct)
  • Disable DNS on the network
  • Use DHCP addressing on the network.

Answer : Disable the ports on the router or switch.

Which of the following is BEST used to prevent other people from viewing a userís computer screen?


Options are :

  • Biometric device
  • Anti-virus software
  • Key fob
  • Privacy filter (Correct)

Answer : Privacy filter

After being infected with a virus, a userís computer does not recognize the user as having local administrator rights to the computer. After troubleshooting the issue, a technician determines the computer needs to be rebuilt and data needs to be restored from the userís backup. Which of the following tools would BEST reset the computer to how it worked when first purchased?


Options are :

  • Recovery Console
  • System Restore
  • Anti-malware software
  • Factory restore CD (Correct)

Answer : Factory restore CD

Which of the following encryption standards is found on older wireless devices and provides minimal security?


Options are :

  • AES
  • WPA
  • WEP (Correct)
  • WPA2

Answer : WEP

Which of the following security threats involve shoulder surfing and phone phishing?


Options are :

  • Man-in-the-Middle
  • Social engineering (Correct)
  • Trojan virus
  • Spyware

Answer : Social engineering

A company is experiencing issues with third parties tailgating authorized users during entry to secure server rooms. Which of the following would BEST alleviate this problem?


Options are :

  • Retinal scanners
  • Mantraps (Correct)
  • Smart card badges
  • Door locks

Answer : Mantraps

A computer program that functions normally while quietly installing malicious software on a machine is known as a:


Options are :

  • DDoS attack.
  • Worm.
  • Phishing attack.
  • Trojan. (Correct)

Answer : Trojan.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions