CompTIA A+ 220-1102 2.0 Security

CompTIA A+ 220-1102 2.0 Security

1 / 251

What is the best way to protect data at rest as per the CompTIA A+ Core 2 exam?

2 / 251

Which application does Windows 10 mobile devices use for file backup and restore?

3 / 251

What is one significant difference between Bring Your Own Device (BYOD) and Corporate-Owned Personally Enabled (COPE) policies in organizations?

4 / 251

What is the main function of domain isolation in Windows Defender Firewall with Advanced Security?

5 / 251

Which of the following is NOT one of the best defenses for protecting e-mail mentioned in the text?

6 / 251

What tasks does Universal Plug and Play (UPnP) perform through network protocols like TCP, IP, HTTP, and DHCP?

7 / 251

What are the benefits of keeping a router’s firmware up to date?

8 / 251

What does an authenticator application do?

9 / 251

What is vishing in computer security?

10 / 251

What describes an unprotected system?

11 / 251

What is the process of Spoofing in terms of network security?

12 / 251

Which protocols are most commonly used to protect cellular and VoIP voice calls?

13 / 251

What is the main purpose of an ad blocker?

14 / 251

What is Folder Redirection primarily used for in an Active Directory network?

15 / 251

Why is it important to change the default user name and password after purchasing a new SOHO router?

16 / 251

What are some recommended actions an organization should take when using a third-party disposal company?

17 / 251

What must a domain controller (DC) have installed to function correctly?

18 / 251

What is a common function of using pattern locks on smartphones?

19 / 251

What is the most secure protection for data at rest?

20 / 251

What does a screened subnet refer to in networking terminology?

21 / 251

What does the principle of least privilege state in terms of logical security and access control?

22 / 251

What is the default browser provided on an Android operating device?

23 / 251

How can you disable the Guest Account in Windows to minimize security risks?

24 / 251

How can the logon time restrictions be set up for specific users?

25 / 251

Which Login/Sign-in option for a Windows 10/11 system makes use of a hardware device like a USB key?

26 / 251

What makes an unpatched system highly vulnerable to attack?

27 / 251

Which of the following is NOT a recommended defense for protecting e-mail from attacks mentioned in the passage?

28 / 251

Which setting in the Local Security Policy app would you adjust to ensure passwords aren’t stored with reversible encryption?

29 / 251

What happens when the ’Never notify’ setting is active in the User Account Control (UAC) of a Windows 10/11 system?

30 / 251

What does the ’Enforce password history’ setting in the Local Security Policy app on Windows 10/11 system do?

31 / 251

What does a swipe lock do on a mobile device such as a smartphone?

32 / 251

What does the system lockout do when the number of unsuccessful login attempts exceeds the threshold value in the system’s settings?

33 / 251

How do anti-malware programs detect polymorphic malware?

34 / 251

What is the purpose of a certificate of destruction within an organization?

35 / 251

Why is it particularly important to create unique passwords for each account, application, and sensitive item on the computer?

36 / 251

Where can content filtering feature be added?

37 / 251

Which storage media can be rendered unrecoverable by using a shredder?

38 / 251

Which is the correct order of wireless encryption protocols from strongest to weakest?

39 / 251

What does a ’Connected’ type of hard token do in Multi-Factor Authentication (MFA)?

40 / 251

Why is it recommended to disable unused ports on a router?

41 / 251

What are the primary vulnerability types created by Bring-your-own-device (BYOD) policies?

42 / 251

What does a boot sector virus do?

43 / 251

What does an eye scan in a biometric system capture?

44 / 251

Which of the following firewall design isolates particular server to limit its access only to those devices that are authorized to do so?

45 / 251

What is the best practice concerning the guest account on a wireless router?

46 / 251

Which feature within the Windows 10 Settings app allows users to use the ’Find My Device’ service?

47 / 251

What does BitLocker Drive Encryption do in Windows 10/11 Pro and Enterprise editions?

48 / 251

What is the purpose of setting strong passwords on Windows 10/11 systems?

49 / 251

What is a noncompliant system?

50 / 251

What is the main benefit of using the address reservation method in DHCP?

51 / 251

In the ’Password must meet complexity requirements’ setting on a Windows 10/11 system, what is the main function of this setting?

52 / 251

What is the purpose of different types of tools and methods in terms of malware threats mentioned in the text?

53 / 251

What does the ’Minimum password length audit’ setting do in the Windows 10/11 Local Security Policy?

54 / 251

According to the text, how does the policy of password expiration and password history enforcement contribute to system security?

55 / 251

Why can policies and procedures relating to mobile devices be more complex than those for other types of computing devices?

56 / 251

What is the common restriction placed on files from untrusted or unknown sources across different operating systems?

57 / 251

What must you have enabled to use Windows Hello on a Windows 10/11 system?

58 / 251

What is the role of NTFS permissions while sharing a file or folder in Windows?

59 / 251

Which editions of Windows 10/11 support the Encrypting File System (EFS)?

60 / 251

What is implied when an Operating System (OS) has reached end-of-life (EOL) status?

61 / 251

What is a ’Dictionary Attack’ in the context of cybersecurity?

62 / 251

What technology does a microwave sensor use and for what purpose in a commercial or industrial context according to CompTIA A+ (220-1102)?

63 / 251

What is the first line of defense against shoulder surfing?

64 / 251

What definition does the U.S. Cybersecurity and Infrastructure Security Agency (CISA) give for ’insider threat’?

65 / 251

What does a keylogger do?

66 / 251

What is a zero-day attack in context of software security?

67 / 251

What does a magnetometer, also known as a walk-through metal detector, measure?

68 / 251

What are the primary non-overlapping channels in the United States?

69 / 251

Which of the following statements about biometric door locks is NOT true?

70 / 251

What does anti-phishing or phishing-awareness training mainly aim to achieve?

71 / 251

What are the categories of multifactor authentication (MFA) elements?

72 / 251

What is the primary function of a soft token in the context of computer security?

73 / 251

What does synchronization mean in the context of web browsers and mobile devices?

74 / 251

What steps must be followed to make hidden files visible on a Windows 10/11 system?

75 / 251

Which of the following is true about Facial biometric technology?

76 / 251

What is the function of the ’Active mode’ in the Defender antivirus tool?

77 / 251

What is the main objective of a phishing attack?

78 / 251

What is the difference between a DoS and a DDoS attack?

79 / 251

What is a Disconnected hard token in MFA procedure?

80 / 251

What is the primary benefit of using User Account Control (UAC) on a Windows 10/11 system?

81 / 251

What triggers an event in a magnetic sensor?

82 / 251

What happens when Microsoft Defender Antivirus is configured in ’Disabled mode’?

83 / 251

What is the primary purpose of the Terminal Access Controller Access-Control System Plus (TACACS+) in wireless networks?

84 / 251

What is ’Somewhere you are’ in the context of a multifactor authentication (MFA) scheme?

85 / 251

What type of technology does an active sensor use in a home or small office setting?

86 / 251

Which of the following is a recommended practice for ensuring the security of end user accounts, data, and resources?

87 / 251

What does CompTIA mean by password best practices?

88 / 251

What modes can the Defender antivirus be configured into?

89 / 251

Which of the following options is NOT a function of the recovery mode on a Windows 10/11 system?

90 / 251

What is the primary reason it could be a good idea to disable or limit the use of AutoRun and AutoPlay on a Windows 10/11 system?

91 / 251

In the context of physical security programs for staff, what do the policies often define?

92 / 251

Which encryption method is applied to Windows 10/11 mobile devices for storage and removable storage?

93 / 251

What is the purpose of a login script?

94 / 251

What methods are commonly used for authentication on wireless networks?

95 / 251

Which of the following is not a type of screen lock mechanism discussed for the CompTIA A+ Core 2 (220-1102) exam?

96 / 251

When using multifactor authentication (MFA), what are the types of factors commonly used for the second factor?

97 / 251

Which of the following statements about the configuration and settings of a router in a home or SOHO network is correct?

98 / 251

What is the focus of logical security in the context of CompTIA A+ Core 2 objectives?

99 / 251

Which of the following is NOT a method of physical security mentioned in the text?

100 / 251

What does a properly-configured firewall do?

101 / 251

Which of the following is NOT used in biometric technologies for physical security programs?

102 / 251

What is a recommended best practice to optimize operating system security?

103 / 251

Which of the following is NOT a key consideration when physically placing a wireless router or an access point?

104 / 251

What are the steps to create a new inbound rule that allows traffic for a specific port number to pass through the Windows Defender Firewall?

105 / 251

What purpose do bollards serve in the security of a secured facility?

106 / 251

Which of the following options is not a way to secure IoT devices according to the text?

107 / 251

What are USB locks and how can they contribute to security?

108 / 251

What does the ’Notify me only when apps try to make changes to my computer (default)’ option do in User Account Control (UAC) settings on a Windows 10/11 system?

109 / 251

What is the main objective of implementing Mobile Device Management (MDM) in an organization?

110 / 251

What are the recommended practices to secure a laptop that is used in a stationary location for some time?

111 / 251

What is a ’Contactless’ hard token as used in a MFA procedure?

112 / 251

What benefits can reinstalling the operating system (OS) provide?

113 / 251

What is the role of policies in account management in Windows?

114 / 251

What are the two basic types of Access Control Lists (ACLs)?

115 / 251

What is the primary function of Data destruction software?

116 / 251

What are the three layers of protection provided by SSL/TLS for a web page that is transmitted back to the user?

117 / 251

What is the purpose of security protocols and encryption standards in wireless networks?

118 / 251

Which of the following actions can trigger the initial infection of a virus?

119 / 251

What does the term ’Login timeout’ refer to in the context of security practices?

120 / 251

What is the function of the ’Notify me only when apps try to make changes to my computer (do not dim my desktop)’ option in the User Account Control (UAC) settings for Windows 10/11?

121 / 251

Which among the following is NOT a type of equipment lock?

122 / 251

What does the ’Always notify me when’ option do in User Account Control (UAC) settings in Windows 10/11?

123 / 251

What does a brute-force attack attempt to discover?

124 / 251

What is an ’Evil Twin’ attack in a Wi-Fi network?

125 / 251

Which method of physical destruction is suitable for rendering storage devices inoperable at home?

126 / 251

What type of features and functions do the settings on most browsers enable or disable?

127 / 251

What should be considered while placing a router in a wireless network to mitigate signal path obstructions?

128 / 251

What are the three primary considerations when selecting a security fence to enclose a secured facility?

129 / 251

Which of the following is NOT a method used in social engineering as described in the text?

130 / 251

What is the length of a pre-shared key (PSK) used in a WPA2 protocol?

131 / 251

Which type of permission allows read, write, and execute actions?

132 / 251

What is the primary purpose of software firewalls in relation to individual mobile devices?

133 / 251

What is the primary function of the Private Browsing Mode in web browsers?

134 / 251

What is impersonation in the context of cybersecurity?

135 / 251

What does a passive sensor do in a motion detection system?

136 / 251

How do you block pop-ups and redirects in Microsoft Edge?

137 / 251

What is the specific functionality of Defender Antivirus in Passive Mode?

138 / 251

What is a whaling attack in the context of cybersecurity?

139 / 251

What are the recommended practices when using screensaver locks for computer security?

140 / 251

Which of these is not a recommended practice for ensuring the security of Personally Identifiable Information (PII)?

141 / 251

In Google Chrome, where can you find the settings for managing ’Pop-ups and Redirects’?

142 / 251

What is tailgating in the context of IT security?

143 / 251

What are the improvements brought by Wi-Fi Protected Access 3 (WAP3) over WPA2?

144 / 251

What is an effective method to protect the contents of an e-mail and its attachments making it unreadable cipher text?

145 / 251

What is the function of the ’Certificate-based’ design policy in Windows Defender Firewall with Advanced Security?

146 / 251

What is the main function of a tomographic sensor?

147 / 251

What is the main purpose of disabling the SSID broadcast on an AP according to the CompTIA objective?

148 / 251

Which of the following is NOT a method of completely erasing or wiping all data from a storage device?

149 / 251

What two types of data are typically saved by a browser?

150 / 251

What is an on-path attack and what are its characteristics?

151 / 251

Which of the following is NOT recommended as an end-user best practice for ensuring the security of accounts, data, and resources?

152 / 251

Which of the following represents the best practice for downloading a Web browser to a PC or mobile device according to the text?

153 / 251

Which of the following statements is TRUE about enabling the Windows Hello Face feature for facial recognition on a Windows system?

154 / 251

What was the purpose of Temporal Key Integrity Protocol (TKIP) in WPA2?

155 / 251

What are some of the benefits of reinstalling an OS?

156 / 251

How can a port be opened on Windows Defender Firewall?

157 / 251

What does AES employ to create a multilayered cipher text that is impossible to crack?

158 / 251

Whichever profile of Firewall & Network Protection in Windows Security is used by default for new network connections and is considered to be the most secure initially due to the presumption that a public network isn’t secure?

159 / 251

What benefits does Single Sign-On (SSO) provide to a user?

160 / 251

What is the purpose of server isolation in the context of Windows Defender Firewall configuration?

161 / 251

What is the process to allow a particular application to pass through Windows Defender Firewall?

162 / 251

What is the main function of ’Inheritance’ in NTFS permissions?

163 / 251

What is the best practice to reduce vulnerability to dumpster diving?

164 / 251

What is Low-level formatting?

165 / 251

What is one of the benefits of reinstalling the OS in the context of ’Elimination of junk files’?

166 / 251

What is a vulnerability in the context of the CompTIA A+ Core 2 exam?

167 / 251

What are the benefits of having security guards even if your organization uses badge readers, key fobs, or smart cards?

168 / 251

When considering a door lock, why could a door lock combined with an access control vestibule improve security?

169 / 251

What is the function of a Photo-sensor in a motion sensor system?

170 / 251

Which of the following statements regarding the security of Short Message Service (SMS) is true?

171 / 251

What is the primary difference between browser extensions and plug-ins, according to the passage?

172 / 251

What is a characteristic of a Trojan?

173 / 251

What is the term for any program or code designed to harm a system or network?

174 / 251

What is the function of a Secure e-mail gateway (SEG) in an organization’s security policies?

175 / 251

Where do you need to go to enable account lockout duration or to set an account lockout threshold?

176 / 251

What does the ’Maximum password age’ setting in the Local Security Policy app of a Windows 10/11 system do?

177 / 251

What components make up a typical alarm system?

178 / 251

Which of the following is not a common key for booting into BIOS?

179 / 251

What is the primary purpose of a BIOS/UEFI password?

180 / 251

Which of the following is the default profile for new network connections in Windows firewall and is initially the most secure of the three location profiles?

181 / 251

What does the ’Minimum password length’ setting in the Local Security Policy app in a Windows 10/11 system do?

182 / 251

What is an Organizational Unit (OU) in Active Directory?

183 / 251

Which of the following describes the ’Domain network’ profile in Windows Defender Firewall?

184 / 251

What does the ’Minimum password age’ setting define in a Windows 10/11 system’s strong password policy?

185 / 251

In the Local Security Policy app on a Windows 10/11 system, which policy enables you to set a limit on the number of unique passwords that must be associated with a user account before a previously used password can be reused?

186 / 251

Which tool, usually contained in most anti-malware packages, can detect unwanted or dangerous e-mail and senders and then quarantine or destroy detected messages?

187 / 251

What requirements are needed for a router’s static IP configuration in a WAN?

188 / 251

Which of the following is not a type of encryption that can be applied to data at rest?

189 / 251

Which devices receive OS and firmware updates from mobile service providers?

190 / 251

According to the text, which of the following factors are important to consider when physically placing a router in a wireless network?

191 / 251

What is the function of Active Directory in a Windows Server domain?

192 / 251

What is the primary difference between a low-level format and a standard format?

193 / 251

Why is it not advisable to drill the power supply of a device while attempting data disposal?

194 / 251

What tasks are performed when a fingerprint or palm print scan is conducted in biometric security systems?

195 / 251

What does the ’Enforce password history’ setting do in the Windows 10/11 Local Security Policy app?

196 / 251

What is a common method used in a Cross-Site Scripting (XSS) attack?

197 / 251

How can the system be protected from casual snooping?

198 / 251

Which of the following could potentially become a threat on a computer system?

199 / 251

What are some purposes of pop-ups?

200 / 251

Which of the following is the most secure protection for data at rest?

201 / 251

What are some of the benefits of reinstalling the OS on a system?

202 / 251

What is the purpose of an access control vestibule (ACV) in security systems?

203 / 251

What is regarded as the most dangerous form of spyware?

204 / 251

Which of the following statements about the Remote Authentication Dial-In User Service (RADIUS) protocol is NOT true?

205 / 251

According to the Fair and Accurate Credit Transactions Act (FACTA) regulations, what are the responsibilities of a business when using an outside vendor for data and device destruction and disposal?

206 / 251

What is the correct order of steps to open the UEFI interface on a Windows 10/11 system?

207 / 251

What is the difference between a Windows AD domain-based group policy and the Local Group Policy Editor?

208 / 251

Which of the following are wireless-specific security settings?

209 / 251

What is a rootkit?

210 / 251

What is the primary function of a firewall in a home or SOHO network?

211 / 251

What are some of the complexity requirements for setting a password according to the Local Security Policy app?

212 / 251

Which of the following is an example of the ’Something you have’ factor used in a multifactor authentication (MFA) scheme?

213 / 251

What is the reason for the Windows 10/11 File Explorer to hide system files and folders by default?

214 / 251

What is the impact of not arranging IP filtering rules in a logical order?

215 / 251

What is a detrimental effect of cryptominers being installed on enterprise servers?

216 / 251

Which of the following options is NOT a step in the process of viewing or modifying the attributes of a file or folder on a Windows 10/11 system?

217 / 251

What is the first line of defense against malware attacks and how can it be implemented?

218 / 251

Which platform includes a native antivirus and anti-malware protection?

219 / 251

What is a profile in terms of mobile device management?

220 / 251

Which of the following is NOT one of the four types of encryption that can be applied to data at rest?

221 / 251

What is the purpose of a cable lock in a security context?

222 / 251

On Windows 10/11 systems, how can you run administrative commands at an elevation level?

223 / 251

Which of the following options represents an example of the ’Something you are’ factor in a multifactor authentication (MFA) scheme?

224 / 251

Which of the following types of hard tokens is a proximity device, transferring security codes through Bluetooth or an RF signal?

225 / 251

What could an SQL injection (SQLi) attack potentially accomplish in a business database?

226 / 251

What does the ’Remote Wipe’ capability do that can help protect personal data?

227 / 251

What is the primary purpose of Kerberos in the authentication process, according to the text?

228 / 251

What is the main benefit of using a home folder in an Active Directory network?

229 / 251

Which device in a video surveillance system allows the security personnel to observe the areas covered by the cameras?

230 / 251

What is the purpose of using a degausser on a storage device?

231 / 251

Which three user account types are created by default when the Windows OS is installed?

232 / 251

What is a PIN code as it pertains to user authentication, and what are its typical characteristics?

233 / 251

How can you block pop-up windows in Firefox?

234 / 251

What is the role of User Training in defending against email attacks?

235 / 251

What function do password manager tools typically provide?

236 / 251

Why is it important to change the default Service Set Identifier (SSID) on an Access Point (AP)?

237 / 251

What is an example of ’Something you know’ in a multifactor authentication (MFA) scheme?

238 / 251

Which of the following technologies does a badge reader use to read ID badges?

239 / 251

What is the function of a Magnetic sensor in a home or small office setup?

240 / 251

What are two primary methods to use software in order to completely wipe all data from a storage device?

241 / 251

What is the first step to activate or deactivate Windows Defender Firewall?

242 / 251

What is a ’Site survey’ in the context of setting up a wireless LAN in a larger organization’s office space?

243 / 251

What is the recommended method for disposing of medium-to-large volumes of paper, magnetic tape, and optical media?

244 / 251

What is the purpose of the ’Relax minimum length limits’ setting in a Windows 10/11 system’s security policy?

245 / 251

What is the purpose of port forwarding in the context of Network Address Translation (NAT)?

246 / 251

What is the primary function of Ransomware?

247 / 251

Which group in Windows has the capability to back up and restore files, but cannot change security settings?

248 / 251

What is one of the purposes of a software firewall like Windows Defender Firewall?

249 / 251

What are the two types of security accounts provided by Active Directory?

250 / 251

What is the purpose of security lighting?

251 / 251

Which of the following is NOT a requirement for the security aspect of a key policy?

Your score is

Boost Your Skills with Free Anki Flashcards

Click the download button to get the CompTIA A+ 220-1102 Anki deck.

Free CompTIA A+ 220-1102 Security Practice Test

The Ultimate Free Practice Test for CompTIA A+ Exam Preparation

Are you aiming to transition into the IT industry or enhance your cybersecurity skills? Our free CompTIA A+ 220-1102 Security practice test is designed to help you succeed. This practice test supports your CompTIA A+ exam preparation, skill enhancement, and career advancement in the IT industry.

Features of Our Practice Test

  • Realistic CompTIA Exam Simulation: Familiarize yourself with the format and types of questions on the actual exam.
  • Skill Enhancement: Strengthen your knowledge in critical areas such as vulnerability management, security, and cybersecurity.
  • Career Change Support: Ideal for those considering a career change or seeking to enter the IT field.
  • Cybersecurity Understanding: Deepen your understanding of essential cybersecurity principles.

Why Choose Our Practice Test?

Our free CompTIA A+ 220-1102 Security practice test is perfect for individuals aiming to enhance their skills and effectively prepare for the CompTIA A+ exam. Whether you’re looking for a job change or wanting to gain more experience in the IT industry, our practice test is your ideal solution.

Start Your Practice Test Today

Begin your journey to CompTIA A+ certification and unlock new opportunities in the IT industry. Access our free practice test and start your preparation now! Improve your IT skills, gain valuable experience, and pave the way for a successful career in cybersecurity and vulnerability management.

Official CompTIA A+ Website

Explore our other free practice tests:

Share the Post:

Related Posts

RSS  
  • Discover How to Work Remotely and Travel!
    Have you ever dreamed about working from beautiful places like Thailand or Japan, but weren’t sure if it’s possible? I’m here to share my adventures and some tips on how to make working remotely while exploring the world a reality.  Who Am I? My name is Josh, and I’m all about creating helpful content on […]
  • Why Contract Work in IT Can Be a Good Start for Your Career
    Hey buddies! Are you curious about what it’s like to work in IT and cyber security? Well, you’re in luck because today we’re diving into the world of contract work and how it might just be the jumpstart your career needed! Getting Into the World of Contract Work in IT Josh, an expert in IT […]
  • Is Cyber Security a Career That Will Last Forever?
    Hey everyone! Have you ever wondered if choosing a career in cyber security is a good idea for the long haul? Well, let’s dive into this topic with the help of Josh Maor’s insights, and find out why cyber security might just be one of the smartest career choices out there. What Is Cyber Security? […]
IT Course

The Affordable, Hands-On Josh Madakor IT Course that gets Results!

Ready to get started your journey?
Cyber Course

The Affordable, Hands-On Cyber Security that gets Results!

Ready to get started your journey?

JOIN OUR

NEWSLETTER

Sign up for our free newsletters.

by joining 8000+ others in my weekly newsletter 

where you’ll get a dose of my thoughts on self-improvement, career,

and life!