CompTIA Security+ Question L-1

Peter, the compliance manager, wants to meet regulations. Peter would like certain ports blocked only on all computers that do credit card transactions. Which of the following should Peter implement to BEST achieve this goal?

A. A host-based intrusion prevention system
B. A host-based firewall
C. Antivirus update system
D. A network-based intrusion detection system

Answer: B

Explanation:
A host-based firewall is installed on a client system and is used to protect the client system from the activities of the user as well as from communication from the network or Internet.

CompTIA Security+ Question D-29

Ann, a security analyst, is preparing for an upcoming security audit. To ensure that she identifies unapplied security controls and patches without attacking or compromising the system, Ann would use which of the following?

A. Vulnerability scanning
B. SQL injection
C. Penetration testing
D. Antivirus update

Answer: A

Explanation:
A vulnerability scan is the process of scanning the network and/or I.T. infrastructure for threats and vulnerabilities. The threats and vulnerabilities are then evaluated in a risk assessment and the necessary actions taken to resolve and vulnerabilities. A vulnerability scan scans for known weaknesses such as missing patches or security updates.

A vulnerability scan is the automated process of proactively identifying security vulnerabilities of computing systems in a network in order to determine if and where a system can be exploited and/or threatened. While public servers are important for communication and data transfer over the Internet, they open the door to potential security breaches by threat agents, such as malicious hackers. Vulnerability scanning employs software that seeks out security flaws based on a database of known flaws, testing systems for the occurrence of these flaws and generating a report of the findings that an individual or an enterprise can use to tighten the network’s security.

CompTIA Network+ Question C-57

Upon arrival at work, an administrator is informed that network users cannot access the file server. The administrator logs onto the server and sees the updates were automatically installed and the network connection shows limited and no availability. Which of the following needs to be rolled back?

A. The browser on the server
B. The server’s NIC drivers
C. The server’s IP address
D. The antivirus updates

Correct Answer: B

CompTIA A+ Core 2 Question F-18

A technician is about to put a computer back into service that has not been turned on for many months. It was healthy when taken out of service and boots quickly without any problems. Which of the following actions would be a best practice to begin computer maintenance? (Select TWO).

A. Run a full antivirus scan.
B. Defragment the hard disk.
C. Run antivirus updates.
D. Run Windows updates.
E. Configure the firewall to access the Internet.

Correct Answer: CD

Explanation:
You have to update the system. Run antivirus updates because antivirus changes frequently as new viruses are discovered. Run Windows updates to keep the system updated and ready to use.

CompTIA A+ Core 2 Question E-39

Which of the following is TRUE about the difference between a worm and a virus?

A. Worms are written in assembly while viruses are written with scripting languages.
B. Viruses hide in the boot record while worms hide within the file system.
C. Worms self propagate while viruses need human intervention to replicate.
D. Viruses disable the antivirus update service while worms kill the antivirus process.

CompTIA A+ Core 2 Question B-55

A technician discovers a networked computer has been infected with a zero day virus. Which of the following is the FIRST thing that should be done to the workstation?

A. Document the symptoms of the virus.
B. Turn off the computer using the power switch.
C. Unplug it from the network.
D. Run an antivirus update and then a full scan.

Correct Answer: C

Explanation:
http://en.wikipedia.org/wiki/Zero-day_virus

CompTIA A+ Core 2 Question B-43

A worker from a branch office goes to the main office for a meeting. They plug their laptop into a couple of wall jacks and do not get network connectivity. Which of the following should the technician check to resolve this issue for the employee?

A. Encryption levels on the laptop
B. All antivirus updates have been performed
C. Disabled switch ports
D. If the users account has been locked

Correct Answer: C

CompTIA A+ Question E-88

A technician installs a biometric device using the manufacturer supplied driver. After confirming the device functions properly, the technician performs Windows and antivirus updates. Which of the following would BEST explain why the biometric device no longer functions?

A. The recently updated antivirus scanning software is interfering with the proper operations of the biometric device.
B. A virus that specifically targets retinal scanning software infected the PC because the user was late applying new definitions.
C. The recently installed Windows updates overwrote the manufacturer’s supplied biometric device driver.
D. The biometric device needs to be recalibrated due to environmental conditions involved with the installation.

Correct Answer: C

Explanation:
Microsoft updates Windows oftenly. The update contains drivers as well. The possible reason of the problem is that Windows update manufacturer’s device driver during the update process. Check the driver to confirm the issue. You can always install the original driver for the biometric device if this problem occurs.