Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com
QUESTION 1
Which of the following logical access control methods would a security administrator need to
modify in order to control network traffic passing through a router to a different network?
A. Configuring VLAN 1
B. ACL
C. Logical tokens
D. Role-based access control changes
Answer: B
QUESTION 2
Which of the following tools limits external access to the network?
A. IDS
B. VLAN
C. Firewall
D. DMZ
Answer: C
QUESTION 3
Which of the following tools was created for the primary purpose of reporting the services that are
open for connection on a networked workstation?
A. Protocol analyzer
B. Port scanner
C. Password crackers
D. Vulnerability scanner
Answer: B
QUESTION 4
Which of the following is MOST likely to be an issue when turning on all auditing functions within a
system?
A. Flooding the network with all of the log information
B. Lack of support for standardized log review tools
C. Too much information to review
D. Too many available log aggregation tools
Answer: C
QUESTION 5
Upon opening the browser, a guest user is redirected to the company portal and asked to agree to
the acceptable use policy. Which of the following is MOST likely causing this to appear?
A. NAT
B. NAC
C. VLAN
D. DMZ
Answer: B
QUESTION 6
USB devices with a virus delivery mechanism are an example of which of the following security
threats?
A. Adware
B. Trojan
C. Botnets
D. Logic bombs
Answer: B
QUESTION 7
Cell phones with network access and the ability to store data files are susceptible to which of the
following risks?
A. Input validation errors
B. SMTP open relays
C. Viruses
D. Logic bombs
Answer: C
QUESTION 8
When establishing a connection between two IP based routers, which of the following protocols is
the MOST secure?
A. TFTP
B. HTTPS
C. FTP
D. SSH
Answer: D
QUESTION 9
Which of the following algorithms provides better protection against brute force attacks by using a
160-bit message digest?
A. MD5
B. SHA-1
C. LANMAN
D. NTLM
Answer: B
QUESTION 10
Which of the following access control technologies provides a rolling password for one-time use?
A. RSA tokens
B. ACL
C. Multifactor authentication
D. PIV card
Answer: A
Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com
No Comment