CompTIA A+ Core 2 Question B-93

A user receives an email seemingly from the director of the company’s IT department. The user however notices that the content of the email is asking for information specifically forbidden to be shared with anyone. This type of interaction is known as which of the following?

A. Phishing
B. Shoulder surfing
C. Malware
D. Spyware

Correct Answer: A

CompTIA A+ Core 2 Question B-92

For the last year, a company has gathered statistics on the most common security incidents. The highest percentage deals with opening email attachments that contain malware. Which of the following would mitigate this issue without reducing productivity?

A. Annual cyber security education
B. Update antivirus signatures more often
C. Block all email attachments
D. Install an IPS on each workstation

CompTIA A+ Core 2 Question B-91

A technician is working on a Windows 7 computer that will not boot correctly; it is stuck in a constant loop. Which of the following should the technician perform FIRST to try and resolve this issue?

A. Repair installation
B. A recovery from a shadow copy
C. System restore
D. Factory restore

Correct Answer: A

CompTIA A+ Core 2 Question B-89

Which of the following BEST represents a security vulnerability of mobile devices? (Select TWO).

A. Unauthorized downloads
B. Viruses
C. Improper file permissions
D. Phishing
E. Theft

Correct Answer: BE

Explanation:
Security of mobile devices can be compromised when a virus infects the device. Another way is theft because a mobile device is portable and can be easily be handled or pocketed.

CompTIA A+ Core 2 Question B-85

A user states that they are having a problem with their word processor on their laptop. Whenever they attempt to type letters with their right hand, numbers and symbols show up instead. Which of the following would address this issue?

A. Switch to a standardized font
B. Restore regional settings to default
C. Toggle the function + num lock combination
D. Connect a full sized external keyboard