Try our new practice tests feature: configure your own test including the number of questions, objectives and time limits

CompTIA A Plus 220 1002 Test 2 (Security)

The CompTIA 220-1002 exam is one of two exams requires to obtain the CompTIA A+ (1000 series). This exam will focus on physical security, logical security concepts, WiFi security, and malware identification and protection.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 20 minutes, 0 seconds)

True or false:

> An example of multi-factor authentication is a username and password

  • False
  • True

In the context of multi-factor authentication, which option IS an example of inherence?

  • Facial recognition
  • One time pin code
  • Unique Account ID
  • Smartphone

What physical device or software application is used to restrict which TCP and UDP ports can be used by a network device?

  • Firewall
  • ACL
  • Port Security
  • HUD Token

What term can be defined as a buffer area between an unsecured and secured areas?

  • Mantrap
  • Privacy Screen
  • Security Guard
  • Entry Control Roster

True or false:

WEP is a strong security protocol that should be used to secure wireless networks

  • False
  • True

What technology provides a secure tunnel over an untrusted network?

  • Firewall
  • ACL
  • VPN
  • DLP

What Active Directory feature can be used to apply default user account permissions?

  • None of these options
  • Group Policy
  • Least Privilege
  • Login scripts

Your CEO often travels and works from public areas. Due to the sensitive nature of the CEO's work you want a solution to prevent other people in the public areas from reading confidential data on the CEO's mobile device screen. What solution can help in this scenario?

  • VPN
  • ACL
  • Data Loss Prevention Policy
  • Privacy Screen

Which of the following options can be used to restrict what devices can be physically connected to a network based on a MAC address?

  • Port security
  • Access Control Lists
  • Switch filtering
  • Firewall

In the context of logical security, what does MDM stand for?

  • Master Data Management
  • Mobile Device Management
  • Meta Data Management
  • Malware Detection Microprocessor

In a Windows Active Directory environment what feature can be used to restrict operating systems from accessing the network if they lack certain Windows Updates?

  • DLP
  • OUs
  • Group Policy
  • Login script

What security measure uses an individual's physical characteristics for authentication?

  • Physical Token
  • Biometric lock
  • Pincode lock
  • Access Card

In the context of multi-factor authentication, which option is NOT an example of something a user has?

  • Password
  • Cell phone with authentication app
  • Credit card
  • Software token

A user has called the help desk you work at describing a broken keyboard. They state their keyboard has special slot they insert a credit card like device into which allows them to log into their PC. What type of device are they referring to?

  • Smart card
  • Certificate
  • Software token
  • DLP

Which statement is true regarding hardware and software tokens?

  • Software tokens should be used for testing purposes only. Real end-users should use hardware tokens.
  • Software tokens are a cheaper alternative to hardware tokens
  • Hardware tokens are a cheaper alternative to software tokens
  • Software tokens are less secure and have been superseded by hardware tokens

What security protocol provides the best security for a WiFi network?

  • SHA256
  • WPA2
  • MAC3
  • WEP

What technology from Microsoft can be used by system administrators to apply policies and configurations to groups of user accounts and client PCs?

  • LDAP
  • Active Directory
  • Global Policy Server
  • Windows Defender

Choose the correct security concept for this statement:

> Users in Team A should not have access to Team B's files as Team A does not need them to complete their assigned tasks.

  • Least Privilege
  • Privacy Restrictions
  • Secure Access Permissions Model (SAPM)
  • Entry Control Roster (ECL)

You are a network engineer tasked with configuring a new WLAN for your employer. While configuring a WAP you are prompted to choose between WPA2-AES and WPA2-TKIP. Which option will provide the highest levels of security?

  • AES
  • TKIP

What is used by HTTPS to verify the authenticity of the server as well as provide encryption for the HTTP protocol?

  • SHA256 hash
  • PKIP
  • A certificate
  • MD5 hash