CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900
Content out of date!

These study materials are for an old exam version. Click here for the up to date study materials!

CompTIA A Plus 220 1002 Test 2 (Security)

Free CompTIA A+ 220-1002 practice test, CompTIA A Plus 220 1002 Test 2 (Security). The CompTIA 220-1002 exam is one of two exams requires to obtain the CompTIA A+ (1000 series). This exam will focus on physical security, logical security concepts, WiFi security, and malware identification and protection.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 15 minutes, 0 seconds)

True or false:

WEP is a strong security protocol that should be used to secure wireless networks

  • False

  • True

In the context of multi-factor authentication, which option IS an example of inherence?

  • Smartphone

  • Facial recognition

  • One time pin code

  • Unique Account ID

True or false:

An example of multi-factor authentication is a username and password

  • True

  • False

What technology provides a secure tunnel over an untrusted network?

  • Firewall

  • VPN

  • DLP

  • ACL

What technology from Microsoft can be used by system administrators to apply policies and configurations to groups of user accounts and client PCs?

  • Windows Defender

  • Active Directory

  • LDAP

  • Global Policy Server

What physical device or software application is used to restrict which TCP and UDP ports can be used by a network device?

  • Port Security

  • ACL

  • HUD Token

  • Firewall

In a Windows Active Directory environment what feature can be used to restrict operating systems from accessing the network if they lack certain Windows Updates?

  • Login script

  • OUs

  • DLP

  • Group Policy

Which statement is true regarding hardware and software tokens?

  • Hardware tokens are a cheaper alternative to software tokens

  • Software tokens should be used for testing purposes only. Real end-users should use hardware tokens.

  • Software tokens are less secure and have been superseded by hardware tokens

  • Software tokens are a cheaper alternative to hardware tokens

In the context of multi-factor authentication, which option is NOT an example of something a user has?

  • Cell phone with authentication app

  • Credit card

  • Password

  • Software token

What Active Directory feature can be used to apply default user account permissions?

  • Group Policy

  • Login scripts

  • Least Privilege

  • None of these options

Your CEO often travels and works from public areas. Due to the sensitive nature of the CEO's work you want a solution to prevent other people in the public areas from reading confidential data on the CEO's mobile device screen. What solution can help in this scenario?

  • VPN

  • Privacy Screen

  • ACL

  • Data Loss Prevention Policy

What security measure uses an individual's physical characteristics for authentication?

  • Physical Token

  • Access Card

  • Pincode lock

  • Biometric lock

Choose the correct security concept for this statement:

Users in Team A should not have access to Team B's files as Team A does not need them to complete their assigned tasks.

  • Entry Control Roster (ECL)

  • Secure Access Permissions Model (SAPM)

  • Least Privilege

  • Privacy Restrictions

In the context of logical security, what does MDM stand for?

  • Meta Data Management

  • Mobile Device Management

  • Master Data Management

  • Malware Detection Microprocessor

A user has called the help desk you work at describing a broken keyboard. They state their keyboard has special slot they insert a credit card like device into which allows them to log into their PC. What type of device are they referring to?

  • Certificate

  • Smart card

  • DLP

  • Software token

Which of the following options can be used to restrict what devices can be physically connected to a network based on a MAC address?

  • Firewall

  • Switch filtering

  • Access Control Lists

  • Port security

What security protocol provides the best security for a WiFi network?

  • MAC3

  • WPA2

  • SHA256

  • WEP

You are a network engineer tasked with configuring a new WLAN for your employer. While configuring a WAP you are prompted to choose between WPA2-AES and WPA2-TKIP. Which option will provide the highest levels of security?

  • AES

  • TKIP

What is used by HTTPS to verify the authenticity of the server as well as provide encryption for the HTTP protocol?

  • A certificate

  • SHA256 hash

  • MD5 hash

  • PKIP

What term can be defined as a buffer area between an unsecured and secured areas?

  • Security Guard

  • Privacy Screen

  • Mantrap

  • Entry Control Roster



Remaining Time 00:15:00