Try our new practice tests feature: configure your own test including the number of questions, objectives and time limits

CompTIA A Plus 220 1002 Test 2 (Security)

The CompTIA 220-1002 exam is one of two exams requires to obtain the CompTIA A+ (1000 series). This exam will focus on physical security, logical security concepts, WiFi security, and malware identification and protection.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 20 minutes, 0 seconds)

Which of the following options can be used to restrict what devices can be physically connected to a network based on a MAC address?

  • Firewall
  • Switch filtering
  • Port security
  • Access Control Lists

You are a network engineer tasked with configuring a new WLAN for your employer. While configuring a WAP you are prompted to choose between WPA2-AES and WPA2-TKIP. Which option will provide the highest levels of security?

  • TKIP
  • AES

What physical device or software application is used to restrict which TCP and UDP ports can be used by a network device?

  • Firewall
  • HUD Token
  • Port Security
  • ACL

A user has called the help desk you work at describing a broken keyboard. They state their keyboard has special slot they insert a credit card like device into which allows them to log into their PC. What type of device are they referring to?

  • Certificate
  • Smart card
  • DLP
  • Software token

True or false:

> An example of multi-factor authentication is a username and password

  • False
  • True

What Active Directory feature can be used to apply default user account permissions?

  • Login scripts
  • Group Policy
  • Least Privilege
  • None of these options

In the context of logical security, what does MDM stand for?

  • Malware Detection Microprocessor
  • Master Data Management
  • Mobile Device Management
  • Meta Data Management

What is used by HTTPS to verify the authenticity of the server as well as provide encryption for the HTTP protocol?

  • MD5 hash
  • A certificate
  • PKIP
  • SHA256 hash

In the context of multi-factor authentication, which option is NOT an example of something a user has?

  • Credit card
  • Software token
  • Cell phone with authentication app
  • Password

What term can be defined as a buffer area between an unsecured and secured areas?

  • Mantrap
  • Entry Control Roster
  • Security Guard
  • Privacy Screen

True or false:

WEP is a strong security protocol that should be used to secure wireless networks

  • True
  • False

What security protocol provides the best security for a WiFi network?

  • MAC3
  • WPA2
  • WEP
  • SHA256

What technology from Microsoft can be used by system administrators to apply policies and configurations to groups of user accounts and client PCs?

  • Global Policy Server
  • LDAP
  • Active Directory
  • Windows Defender

What technology provides a secure tunnel over an untrusted network?

  • VPN
  • ACL
  • DLP
  • Firewall

Your CEO often travels and works from public areas. Due to the sensitive nature of the CEO's work you want a solution to prevent other people in the public areas from reading confidential data on the CEO's mobile device screen. What solution can help in this scenario?

  • Data Loss Prevention Policy
  • VPN
  • ACL
  • Privacy Screen

What security measure uses an individual's physical characteristics for authentication?

  • Access Card
  • Biometric lock
  • Pincode lock
  • Physical Token

Choose the correct security concept for this statement:

> Users in Team A should not have access to Team B's files as Team A does not need them to complete their assigned tasks.

  • Privacy Restrictions
  • Least Privilege
  • Secure Access Permissions Model (SAPM)
  • Entry Control Roster (ECL)

In a Windows Active Directory environment what feature can be used to restrict operating systems from accessing the network if they lack certain Windows Updates?

  • Group Policy
  • Login script
  • OUs
  • DLP

In the context of multi-factor authentication, which option IS an example of inherence?

  • One time pin code
  • Facial recognition
  • Smartphone
  • Unique Account ID

Which statement is true regarding hardware and software tokens?

  • Software tokens are a cheaper alternative to hardware tokens
  • Hardware tokens are a cheaper alternative to software tokens
  • Software tokens are less secure and have been superseded by hardware tokens
  • Software tokens should be used for testing purposes only. Real end-users should use hardware tokens.