CompTIA Security+ Question L-11

Ann, a security administrator at a call center, has been experiencing problems with users intentionally installing unapproved and occasionally malicious software on their computers. Due to the nature of their jobs, Ann cannot change their permissions. Which of the following would BEST alleviate her concerns?

A. Deploy a HIDS suite on the users’ computers to prevent application installation.
B. Maintain the baseline posture at the highest OS patch level.
C. Enable the pop-up blockers on the users’ browsers to prevent malware.
D. Create an approved application list and block anything not on it.

Answer: D

Explanation:
You can use Software Restriction Policy or its successor AppLocker to prevent unauthorized applications from running or being installed on computers. Software Restriction Policies (SRP) is Group Policy-based feature that identifies software programs running on computers in a domain, and controls the ability of those programs to run. Software restriction policies are part of the Microsoft security and management strategy to assist enterprises in increasing the reliability, integrity, and manageability of their computers. You can use AppLocker as part of your overall security strategy for the following scenarios: Help prevent malicious software (malware) and unsupported applications from affecting computers in your environment. Prevent users from installing and using unauthorized applications. Implement application control policy to satisfy portions of your security policy or compliance requirements in your organization.

CompTIA Security+ Question I-38

A network inventory discovery application requires non-privileged access to all hosts on a network for inventory of installed applications. A service account is created by the network inventory discovery application for accessing all hosts. Which of the following is the MOST efficient method for granting the account non-privileged access to the hosts?

A. Implement Group Policy to add the account to the users group on the hosts
B. Add the account to the Domain Administrator group
C. Add the account to the Users group on the hosts
D. Implement Group Policy to add the account to the Power Users group on the hosts.

Answer: A

Explanation:
Group Policy is an infrastructure that allows you to implement specific configurations for users and computers. Group Policy settings are contained in Group Policy objects (GPOs), which are linked to the following Active Directory directory service containers: sites, domains, or organizational units (OUs). This means that if the GPO is linked to the domain, all Users groups in the domain will include the service account.

CompTIA Security+ Question I-19

A group policy requires users in an organization to use strong passwords that must be changed every 15 days. Peter and Ann were hired 16 days ago. When Peter logs into the network, he is prompted to change his password; when Ann logs into the network, she is not prompted to change her password. Which of the following BEST explains why Ann is not required to change her password?

A. Ann’s user account has administrator privileges.
B. Peter’s user account was not added to the group policy.
C. Ann’s user account was not added to the group policy.
D. Peter’s user account was inadvertently disabled and must be re-created.

Answer: C

Explanation:
Group policy is used to manage Windows systems in a Windows network domain environment by means of a Group Policy Object (GPO). GPO’s include a number of settings related to credentials, which includes password expiration. Because Anne was not prompted to change her password, it could only mean that her user account was not added to the group policy.

CompTIA Security+ Question E-70

An IT security technician needs to establish host based security for company workstations. Which of the following will BEST meet this requirement?

A. Implement IIS hardening by restricting service accounts.
B. Implement database hardening by applying vendor guidelines.
C. Implement perimeter firewall rules to restrict access.
D. Implement OS hardening by applying GPOs.

Answer: D

Explanation:
Hardening is the process of securing a system by reducing its surface of vulnerability. Reducing the surface of vulnerability typically includes removing or disabling unnecessary functions and features, removing or disabling unnecessary user accounts, disabling unnecessary protocols and ports, and disabling unnecessary services. This can be implemented using the native security features of an operating system, such as Group Policy Objects (GPOs).

CompTIA Security+ Question E-26

A company is starting to allow employees to use their own personal without centralized management. Employees must contract IT to have their devices configured to use corporate email; access is also available to the corporate cloud-based services. Which of the following is the BEST policy to implement under these circumstances?

A. Acceptable use policy
B. Security policy
C. Group policy
D. Business Agreement policy

Answer: A

CompTIA Security+ Question B-39

A user attempts to install new and relatively unknown software recommended by a colleague. The user is unable to install the program, despite having successfully installed other programs previously. Which of the following is MOST likely the cause for the user’s inability to complete the installation?

A. Application black listing
B. Network Intrusion Prevention System
C. Group policy
D. Application white listing

Answer: A

CompTIA Network+ Question C-10

A network administrator received the following email from a user:
From: user@company.com
To: abuse@company.com
Subject: Free smart phone
Dear user,
please click the following link to get your free smart phone http://www.freesmartphone.it:8080/survey.php

Which of of the following should the administrator do to prevent all employees from accessing the link in the above email, while still allowing Internet access to the freesmartphone.it domain?

A. Add http://www.freesmartphone.it:8080/survey.php to the browser group policy block list.
B. Add DENY TCP http://www.freesmartphone.it ANY EQ 8080 to the firewall ACL
C. Add DENY IP ANY ANY EQ 8080 to the intrusion detection system filter
D. Add http://www.freesmartphone.it:8080/survey.php to the load balancer

Correct Answer: A

CompTIA Network+ Question A-46

A technician has finished configuring AAA on a new network device. However, the technician is unable to log into the device with LDAP credentials but is able to do so with a local user account. Which of the following is the MOST likely reason for the problem?

A. Username is misspelled is the device configuration file
B. IDS is blocking RADIUS
C. Shared secret key is mismatched
D. Group policy has not propagated to the device

Correct Answer: C

Explanation:
AAA through RADIUS uses a Server Secret Key (a shared secret key). A secret key mismatch could cause login problems.
Authentication, authorization, and accounting (AAA) allows a network to have a single repository of user credentials. A network administrator can then, for example, supply the same credentials to log in to various network devices (for example, routers and switches). RADIUS and TACACS+ are protocols commonly used to communicate with an AAA server.

CompTIA A+ Core 2 Question I-39

A technician wants to run a full diagnostic of the file system on a users hard drive and fix any index errors encountered, but the group policy on the computer prevents this from being executed while in Windows. Which of the following can the technician do to accomplish this?

A. Reboot the PC into Recovery Console and run CHKDSK with the /I switch.
B. Reboot the PC into Safe Mode and run Disk Defragmenter from the System Tools.
C. Reboot the PC into Safe Mode and run Disk Cleanup from the System Tools.
D. Reboot the PC into Recovery Console and run CHKDSK with the /R switch.

Correct Answer: D