ads

26 November 2024

CompTIA A+ Core 2: Wireless Security Protocols & Authentication Methods

Question:

Which cryptographic solution in WPA3 personal replaces a pre-shared key (PSK)?

  • SAE

Question
:

What does Kerberos authentication use to grant user access to resources?

  • Ticket

Question
:

Which Wi-Fi standards use AES?

  • WPA2
  • WPA3

Question
:

Which Wi-Fi standard uses TKIP?

  • WPA

Question
:

Which aspect of computing does MFA enhance security for?

  • Authentication

Question
:

Which cryptographic solution in WPA2 replaces TKIP?

  • AES

Question
:

Which UDP ports are used by RADIUS?

  • 1812

Question
:

Which TCP port is used by TACACS+?

  • 49



 

CompTIA A+ Core 2: Securing SOHO Networks & Browser Security

 

Question:

Which web browser provides the most privacy online?

  • Tor Browser


Question

:

What is the difference between a wireless router and a wireless access point?

  • Wireless routers can send WLAN traffic to other remote networks


Question

:

What is the purpose of a web browser extension?

  • It provides additional functionality to a web browser


Question

:

How is port triggering different from port forwarding?

  • Port forwarding leaves a TCP or UDP port open all the time


Question

:

Which is the default TCP port number for HTTPS?

  • 443


Question

:

Which is most commonly used to secure a password manager vault?

  • Master password


Question

:

How does disabling SSID broadcast enhance Wi-Fi security?

  • The WLAN name is not visible to user devices


Question

:

Which name is given to private browsing mode in the Google Chrome web browser?

  • incognito



CompTIA A+ Core 2: Operating System Security Best Practices

 

Question:

You are managing the properties of an Active Directory user account using the Active Directory Users and computers tool. You need to set login time restrictions. Which tab should you click?

  • Account


Question

:

What can members of the ADMINISTRATORS group do that members of the POWER USERS group cannot?

  • Change display settings


Question

:

How do NTFS permissions differ from share permissions?

  • They are enforced locally


Question

:

Which term defines sending a malicious email message to a user in an attempt to trick them into divulging sensitive information or clicking a link?

  • Phishing


Question

:

You have configured Active Directory Group Policy password settings. Which command refreshes Group Policy immediately on a host?

  • gpupdate


Question

:

With asymmetric encryption, which key is used to decrypt a message?

  • Private


Question

:

Which authentication methods are considered biometric?

  • Fingerprint

  • Facial recognitions


Question

:

Which Windows feature can prevent apps from making changes without your consent?

  • UAC


Question

:

Which port do ICMP echo requests use?

  • Echo requests to not use a port number


Question

:

Which Linux command switches to the root account?

  • su


Question

:

Which firmware component is automatically used with BitLocker for the operating system drive?

  • TPM


Question

:

Which Windows command line tool manages EFS?

  • cipher


Question

:

Which Windows tool in an Active Directory domain can apply a single AutoPlay configuration to all domain-joined computers?

  • Group Policy


Question

:

You have a temporary folder that periodically triggers a false positive for virus detections when you install apps. What should you do to prevent these false positives in the future?

  • Add an exclusion




CompTIA A+ Core 2: Operating System & Network Management

 


Question:

Which Windows command bypasses the DNS client cache and tests DNS name resolution?

  • nslookup


Question

:

A user complains that they are unable to access the Internet from their laptop. Upon further examination you notice that the user station IP address begins with 169.254. What does this mean?

  • A DHCP server was not found on the network


Question

:

Which Windows command starts the control panel tool?

  • control panel


Question

:

Which type of firewall is Windows Defender firewall?

  • Packet filtering


Question

:

Which type of VPN uses port 443 and is considered to be “firewall friendly?”

  • SSTP


Question

:

Users complain about slow VPN access from their Windows laptops when they leave the office. You discover that users are enabling smartphone Wi-Fi hotspots that they connect their laptops to when out of the office. How can you ensure VPN access is unavailable over smartphone Wi-Fi hotspots?

  • Configure the Wi-Fi network as a metered network, disable the “Allow VPN over metered networks” option


Question

:

Which Linux command shows IP addresses on a Linux host?

  • ip a


Question

:

Which network service is required for Active Directory to function?

  • DNS


Question

:

Which macOS tool is used to create backups?

  • Time Machine


Question

:

You are using the Windows file explorer tool and have navigated to a folder deep in the file system hierarchy. You would like to issue PowerShell commands in this directory. What should you do?

  • Hold SHIFT, right-click the folder and choose “Open PowerShell window here”


Question

:

Which port does a DNS server listen for client queries on?

  • UDP 53


Question

:

Which type of record resolves and IPv6 address to a FQDN?

  • AAAA


Question

:

How do client stations discover Active Directory domain controllers?

  • DNS service location records


Question

:

How many bits are in an IPv6 IP address?

  • 128



22 November 2024

CompTIA A+ Core 2: Malware Detection, Removal, & Prevention

 


Question:

What are the different types of keyloggers?

  • Physical keyloggers

  • Software-base keyloggers


Question

:

What are some signs you may have a Rootkit installed on your system?

  • Blue screens

  • Performance issues


Question

:

What are some common types of a Trojan Horse?

  • Backdoor

  • Downloader

  • Fake AV


Question

:

How can you prevent boot sector viruses? 

  • Maintain an updated operating system

  • Maintain hardware-based updates

  • Use an updated antivirus


Question

:

How can you protect a computer from Virus activity?

  • Perform systems updates

  • Download from trusted sites only

  • Updated anti-virus protection


Question

:

What are some of the commands you can use in the recovery console?

  • fixmbr

  • chkdsk

  • fixboot


Question

:

What are some features of modern anti-malware software?

  • Web filtering

  • Sandboxing


Question

:

What are some signs that you have a Cryptomining malware installed on a computer?

  • Overheating GPU

  • Decreased performance

  • Increased CPU usage


Question
:

Which are some advantages to using a software firewall?

  • Configurable

  • Affordable


Question

:

Which types of spyware may you encounter on a system?

  • Trojan spyware

  • Cookies

  • Adware


Question

:

What are some areas you may want end-user training to focus on?

  • Identifying malware

  • Email usage

  • Removable storage usage


Question

:

What can you do to limit the impact/chances of a ransomware event?

  • Educate users on safe computer usage

  • Backup and secure data regularly

  • Maintain updated security software