Try our new practice tests feature: configure your own test including the number of questions, objectives and time limits

CompTIA A Plus 220 1002 Test 2 (Security)

The CompTIA 220-1002 exam is one of two exams requires to obtain the CompTIA A+ (1000 series). This exam will focus on physical security, logical security concepts, WiFi security, and malware identification and protection.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 20 minutes, 0 seconds)

Which of the following options can be used to restrict what devices can be physically connected to a network based on a MAC address?

  • Port security
  • Firewall
  • Switch filtering
  • Access Control Lists

What technology from Microsoft can be used by system administrators to apply policies and configurations to groups of user accounts and client PCs?

  • Active Directory
  • Windows Defender
  • LDAP
  • Global Policy Server

A user has called the help desk you work at describing a broken keyboard. They state their keyboard has special slot they insert a credit card like device into which allows them to log into their PC. What type of device are they referring to?

  • Software token
  • Smart card
  • DLP
  • Certificate

What term can be defined as a buffer area between an unsecured and secured areas?

  • Entry Control Roster
  • Privacy Screen
  • Security Guard
  • Mantrap

In the context of multi-factor authentication, which option IS an example of inherence?

  • Unique Account ID
  • One time pin code
  • Smartphone
  • Facial recognition

What physical device or software application is used to restrict which TCP and UDP ports can be used by a network device?

  • ACL
  • HUD Token
  • Port Security
  • Firewall

What technology provides a secure tunnel over an untrusted network?

  • ACL
  • VPN
  • Firewall
  • DLP

Your CEO often travels and works from public areas. Due to the sensitive nature of the CEO's work you want a solution to prevent other people in the public areas from reading confidential data on the CEO's mobile device screen. What solution can help in this scenario?

  • Privacy Screen
  • Data Loss Prevention Policy
  • ACL
  • VPN

True or false:

WEP is a strong security protocol that should be used to secure wireless networks

  • True
  • False

You are a network engineer tasked with configuring a new WLAN for your employer. While configuring a WAP you are prompted to choose between WPA2-AES and WPA2-TKIP. Which option will provide the highest levels of security?

  • AES
  • TKIP

Which statement is true regarding hardware and software tokens?

  • Hardware tokens are a cheaper alternative to software tokens
  • Software tokens should be used for testing purposes only. Real end-users should use hardware tokens.
  • Software tokens are less secure and have been superseded by hardware tokens
  • Software tokens are a cheaper alternative to hardware tokens

Choose the correct security concept for this statement:

> Users in Team A should not have access to Team B's files as Team A does not need them to complete their assigned tasks.

  • Privacy Restrictions
  • Least Privilege
  • Entry Control Roster (ECL)
  • Secure Access Permissions Model (SAPM)

In a Windows Active Directory environment what feature can be used to restrict operating systems from accessing the network if they lack certain Windows Updates?

  • OUs
  • DLP
  • Login script
  • Group Policy

What Active Directory feature can be used to apply default user account permissions?

  • Group Policy
  • Login scripts
  • Least Privilege
  • None of these options

True or false:

> An example of multi-factor authentication is a username and password

  • False
  • True

What is used by HTTPS to verify the authenticity of the server as well as provide encryption for the HTTP protocol?

  • A certificate
  • MD5 hash
  • PKIP
  • SHA256 hash

What security measure uses an individual's physical characteristics for authentication?

  • Biometric lock
  • Physical Token
  • Pincode lock
  • Access Card

What security protocol provides the best security for a WiFi network?

  • MAC3
  • WEP
  • WPA2
  • SHA256

In the context of logical security, what does MDM stand for?

  • Meta Data Management
  • Mobile Device Management
  • Malware Detection Microprocessor
  • Master Data Management

In the context of multi-factor authentication, which option is NOT an example of something a user has?

  • Credit card
  • Password
  • Software token
  • Cell phone with authentication app