15.01.2024 Views

CompTIA A+ Certification All-in-One Exam Guide

  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

1. D. Social engineering is the process of using or manipulating people

to gain access to network resources.

2. D. Smart cards are an example of hardware authentication devices.

3. C. You can use Local Security Policy to stop someone from logging

on to a local machine.

4. A. To open a port on your hardware firewall and send incoming

traffic to a specific PC, use port forwarding.

5. B. Zander clearly installed a Trojan horse, a virus masquerading as a

game.

6. D. Mary should set up WPA2 on her Wi-Fi router.

7. C. You can enable local auditing through Local Security Policy.

8. D. John just practiced tailgating on the unsuspecting company.

9. B. Jill needs to enforce compliance to help keep the tech support calls

at a minimum and the uptime for users at a maximum.

10. D. The best policy includes updating the software engine and

definitions, scanning PCs regularly, and educating users.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!