Try our new practice tests feature: configure your own test including the number of questions, objectives and time limits

CompTIA A Plus 220 1002 Test 2 (Security)

The CompTIA 220-1002 exam is one of two exams requires to obtain the CompTIA A+ (1000 series). This exam will focus on physical security, logical security concepts, WiFi security, and malware identification and protection.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 20 minutes, 0 seconds)

What security measure uses an individual's physical characteristics for authentication?

  • Pincode lock
  • Biometric lock
  • Physical Token
  • Access Card

True or false:

> An example of multi-factor authentication is a username and password

  • True
  • False

What security protocol provides the best security for a WiFi network?

  • MAC3
  • WEP
  • SHA256
  • WPA2

What physical device or software application is used to restrict which TCP and UDP ports can be used by a network device?

  • Firewall
  • ACL
  • HUD Token
  • Port Security

What is used by HTTPS to verify the authenticity of the server as well as provide encryption for the HTTP protocol?

  • MD5 hash
  • SHA256 hash
  • A certificate
  • PKIP

A user has called the help desk you work at describing a broken keyboard. They state their keyboard has special slot they insert a credit card like device into which allows them to log into their PC. What type of device are they referring to?

  • DLP
  • Smart card
  • Certificate
  • Software token

Which statement is true regarding hardware and software tokens?

  • Software tokens are less secure and have been superseded by hardware tokens
  • Software tokens are a cheaper alternative to hardware tokens
  • Hardware tokens are a cheaper alternative to software tokens
  • Software tokens should be used for testing purposes only. Real end-users should use hardware tokens.

In the context of multi-factor authentication, which option is NOT an example of something a user has?

  • Software token
  • Cell phone with authentication app
  • Credit card
  • Password

Which of the following options can be used to restrict what devices can be physically connected to a network based on a MAC address?

  • Access Control Lists
  • Switch filtering
  • Firewall
  • Port security

Choose the correct security concept for this statement:

> Users in Team A should not have access to Team B's files as Team A does not need them to complete their assigned tasks.

  • Privacy Restrictions
  • Entry Control Roster (ECL)
  • Least Privilege
  • Secure Access Permissions Model (SAPM)

What term can be defined as a buffer area between an unsecured and secured areas?

  • Entry Control Roster
  • Mantrap
  • Privacy Screen
  • Security Guard

In the context of logical security, what does MDM stand for?

  • Meta Data Management
  • Malware Detection Microprocessor
  • Master Data Management
  • Mobile Device Management

Your CEO often travels and works from public areas. Due to the sensitive nature of the CEO's work you want a solution to prevent other people in the public areas from reading confidential data on the CEO's mobile device screen. What solution can help in this scenario?

  • Data Loss Prevention Policy
  • ACL
  • VPN
  • Privacy Screen

What technology provides a secure tunnel over an untrusted network?

  • ACL
  • VPN
  • Firewall
  • DLP

In the context of multi-factor authentication, which option IS an example of inherence?

  • One time pin code
  • Unique Account ID
  • Facial recognition
  • Smartphone

What Active Directory feature can be used to apply default user account permissions?

  • Least Privilege
  • Login scripts
  • None of these options
  • Group Policy

What technology from Microsoft can be used by system administrators to apply policies and configurations to groups of user accounts and client PCs?

  • LDAP
  • Global Policy Server
  • Active Directory
  • Windows Defender

You are a network engineer tasked with configuring a new WLAN for your employer. While configuring a WAP you are prompted to choose between WPA2-AES and WPA2-TKIP. Which option will provide the highest levels of security?

  • AES
  • TKIP

In a Windows Active Directory environment what feature can be used to restrict operating systems from accessing the network if they lack certain Windows Updates?

  • OUs
  • Group Policy
  • DLP
  • Login script

True or false:

WEP is a strong security protocol that should be used to secure wireless networks

  • False
  • True