CompTIA Security+ Question D-62

Concurrent use of a firewall, content filtering, antivirus software and an IDS system would be considered components of:

A. Redundant systems.
B. Separation of duties.
C. Layered security.
D. Application control.

Answer: C

Explanation:
Layered security is the practice of combining multiple mitigating security controls to protect resources and data.

CompTIA Security+ Question D-3

Peter, the system administrator, wants to restrict access to advertisements, games, and gambling web sites. Which of the following devices would BEST achieve this goal?

A. Firewall
B. Switch
C. URL content filter
D. Spam filter

Answer: C

Explanation:
URL filtering, also known as web filtering, is the act of blocking access to a site based on all or part of the URL used to request access. URL filtering can focus on all or part of a fully qualified domain name (FQDN), specific path names, specific filenames, specific fi le extensions, or entire specific URLs. Many URL-filtering tools can obtain updated master URL block lists from vendors as well as allow administrators to add or remove URLs from a custom list.

CompTIA Security+ Question C-30

A security technician is attempting to improve the overall security posture of an internal mail server. Which of the following actions would BEST accomplish this goal?

A. Monitoring event logs daily
B. Disabling unnecessary services
C. Deploying a content filter on the network
D. Deploy an IDS on the network

Answer: B

Explanation:
One of the most basic practices for reducing the attack surface of a specific host is to disable unnecessary services. Services running on a host, especially network services provide an avenue through which the system can be attacked. If a service is not being used, disable it.

CompTIA Security+ Question B-85

A company is trying to limit the risk associated with the use of unapproved USB devices to copy documents. Which of the following would be the BEST technology control to use in this scenario?

A. Content filtering
B. IDS
C. Audit logs
D. DLP

Answer: D

Explanation:
Data loss prevention (DLP) is a strategy for making sure that end users do not send sensitive or critical information outside the corporate network. The term is also used to describe software products that help a network administrator control what data end users can transfer.

CompTIA Network+ Question B-3

A network technician is replacing security devices that protect the DMZ for a client. The client has an application that allows external users to access the application remotely. After replacing the devices, the external users are unable to connect remotely to the application. Which of the following is MOST likely misconfigured?

A. Content filter
B. Firewall
C. DNS
D. DHCP

Correct Answer: B

CompTIA Network+ Question A-36

A company has seen an increase in ransomware across the enterprise. Which of the following should be implemented to reduce the occurrences?

A. ARP inspection
B. Intrusion detection system
C. Web content filtering
D. Port filtering

Correct Answer: C

Explanation:
Ransomware is a type of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator(s) of the malware in order for the restriction to be removed.
The best way to avoid ransomware include proactive measures like the following: Don’t click on any URL or open an attachment you are not expecting.
Implement an email content filtering service Install a web content filtering service
Invest in leading end point security software solutions

CompTIA Network+ Question A-10

A client is concerned about a hacker compromising a network in order to gain access to confidential research data. Which of the following could be implemented to redirect any attackers on the network?

A. DMZ
B. Content Filter
C. Botnet
D. Honeypot

Correct Answer: D

CompTIA A+ Core 2 Question F-81

A user reports that every time they use a search engine and click on a link to go to a website, they instead are taken to a site blocked by their companys content filter. The user is not trying to go to the blocked site and needs to be able to successfully use the search engine to complete their assignment. Which of the following tools would a technician use to BEST resolve this issue?

A. Anti-malware software
B. Factory pre-installation
C. System restore
D. Recovery console

CompTIA A+ Core 2 Question A-30

A manager suspects a user has obtained movies protected by copyright using a torrent client. An incident response technician responds and verifies the user has indeed been violating company policy. Which of the following would be the next BEST step for this technician to perform?

A. Secure the workstation in a limited access facility.
B. Document the incident, purge all policy violating materials.
C. Immediately delete all unauthorized materials.
D. Reprimand the user and apply a content filter to their profile.

Correct Answer: A

CompTIA A+ Core 2 Question A-3

A technician is configuring wireless for a home office. The customer wants to prevent others from accessing the wireless network. The customer has a small number of devices on the network and does not want to have to remember a complicated password. Which of the following should the technician recommend?

A. Enable MAC filtering
B. Disable SSID broadcast
C. Assign static IP addresses
D. Turn on content filtering

Correct Answer: A