CompTIA Network+ Question B-64

An engineer is reviewing the implementation requirements for an upcoming project. The basic requirements identified by the customer include the following:

– WLAN architecture supporting speeds in excess of 150 Mbps
– Clientless remote network access
– Port-based network access control.

Which of the following solution sets properly addresses all of the identified requirements?

A. 802.11a, IPSec VPN, 802.1x
B. 802.11ac, MPLS, 802.3
C. 802.11b, PPTP, 802.1x
D. 802.11g, MS-CHAP, 802.16
E. 802.11n, SSL-VPN, 802.1x

Correct Answer: E

CompTIA Network+ Question B-42

When troubleshooting a network problem, browsing through the log of a switch, it is discovered that multiple frames contain errors. In which of the following layers does the problem reside? (Select TWO).

A. Layer 2
B. Layer 3
C. Layer 5
D. Transport layer
E. Data link
F. Physical layer

Correct Answer: AE

Explanation:
Layer 2 of the OSI reference model is the data-link layer. Components of the data-link layer include frame-format, Media Access Control (MAC) addressing, protocol identification and error detection.
When data is being sent, it is split into protocol data units (PDUs) as it passes through the layers of the OSI model. The PDUs have different names as they are passed through the layers of the OSI model. In layer 2, the PDU is called a ‘Frame’.
The most common protocol specified in the data-link layer is Ethernet and the most common network component in the data-link layer is a network switch.
In this question, problems are discovered with Ethernet frames by examining the logs in a network switch. Therefore, for this question, we are working in Layer 2, the data-link layer.

CompTIA A+ Core 2 Question I-98

A technician wants to prevent users in a computer lab from seeing the name of the last user who logged onto the computer after the user logs out from the workstation. Which of the following MUST the technician configure?

A. Screen saver advanced options
B. User access control
C. Local computer policy
D. Control Panel options

Correct Answer: C

CompTIA A+ Core 2 Question I-52

A technician, Peter, has a wired switch in a conference room for guests. In which of the following ways could Peter restrict the network to only six devices at a time, with minimum management effort? (Select TWO).

A. Disable the extra Ethernet ports on the switch
B. Configure DHCP for six addresses maximum
C. Enable Spanning Tree protocol
D. Create an access control list for each new PC
E. Configure DNS to only resolve six IP addresses F: Add each guest to the MAC filter list

Correct Answer: AB

CompTIA A+ Core 2 Question I-8

Which of the following describes when an application is able to reuse Windows login credentials?

A. Access control list
B. Principle of least privilege
C. Single sign-on
D. Pass-through authentication

CompTIA A+ Core 2 Question G-22

A technician is tasked with changing the account lockout threshold to 30 minutes in Windows 7. Which of the following should the technician use to accomplish this task?

A. User Access Control
B. Windows Security Center
C. Local Security Policy
D. Users and Groups

CompTIA A+ Core 2 Question E-100

A user has recently purchased and installed a new top of the line video card for playing games on Windows 7. However, during game play the images are blurred and artifacts appear. Once the user returns to the Windows desktop, everything returns to normal. Which of the following could be the problem? (Select TWO).

A. The video card requires an adapter to output to the monitor
B. User Access Control is preventing the game from functioning
C. The video card requires a driver update
D. The game is not compatible with Windows 7
E. The graphics card is faulty and should be replaced
F. The IRQ channel must be appropriately set for the video card

Correct Answer: CE

CompTIA A+ Core 2 Question D-61

Emily, an end-user, reports to Peter, a helpdesk technician, that her computer has been redirecting her browser to unknown websites when clicking on search results. Peter runs a malware scan and finds that her computer is infected with malware. Peter uses the anti- malware program to remove the infection but Emily reports that the problem resurfaced the next day. Peter runs the malware scan again and finds the same malware is still infecting Emily’s computer. Peter runs several passes of the malware scan to remove the infection but it keeps recurring. Which of the following would MOST likely aid in removing the infection?

A. Enable Windows User Access Control to ensure the user has proper rights to remove the infected files.
B. Disable Windows firewall as it may be conflicting with the malware scan.
C. Run the malware scan in Windows safe mode.
D. Change the desktops IP address to a different subnet.

Correct Answer: C

CompTIA A+ Core 2 Question A-16

An end user has reported not receiving emails sent by a specific customer. Which of the following is the MOST likely cause of this issue?

A. The HIPS device is blocking the messages
B. The access control list is blocking the messages
C. The email filter has quarantined the messages
D. The firewall is blocking the sender’s email address

Correct Answer: C