CompTIA A+ Core 2 Question E-87

Which of the following relies on individual characteristics unique to each person?

A. Rootkits
B. Phishing
C. Antispyware
D. Biometrics

Correct Answer: D

CompTIA A+ Core 2 Question E-41

Which of the following security methods requires that a user enter a passcode that is changed at regular intervals?

A. WPA encryption
B. Biometrics
C. PSK
D. RSA token

Correct Answer: D

CompTIA A+ Core 2 Question C-58

Which of the following BEST describes the practice of attempting to gain information through deceptive emails?

A. Hashing
B. Biometrics
C. Phishing
D. Encryption

Correct Answer: C