CompTIA Network+ Question C-51

A technician configures a firewall in the following manner in order to allow HTTP traffic.

Source IPZone: Any Untrust
Dest IPZone: Any DMZ
Port: 80
Action: Allow

The organization should upgrade to which of the following technologies to prevent unauthorized traffic from traversing the firewall?

A. HTTPS
B. Stateless packet inspection
C. Intrusion detection system
D. Application aware firewall

Correct Answer: D

CompTIA Network+ Question C-36

A network technician needs to monitor the network to find a user that is browsing inappropriate websites. Which of the following would the technician use to view the website and find the user browsing it?

A. An SNMP GET
B. A top listener tool
C. An intrusion detection system
D. A packet sniffer

Correct Answer: D

CompTIA Network+ Question C-23

A company has had several virus infections over the past few months. The infections were caused by vulnerabilities in the application versions that are being used. Which of the following should an administrator implement to prevent future outbreaks?

A. Host-based intrusion detection systems
B. Acceptable use policies
C. Incident response team
D. Patch management

Correct Answer: D

Explanation:
As vulnerabilities are discovered, the vendors of the operating systems or applications often respond by releasing a patch. A patch is designed to correct a known bug or fix a known vulnerability, such as in this case to be vulnerable to virus infections, in a piece of software.
A patch differs from an update, which, in addition to fixing a known bug or vulnerability, adds one or more features to the software being updated.

CompTIA Network+ Question C-10

A network administrator received the following email from a user:
From: user@company.com
To: abuse@company.com
Subject: Free smart phone
Dear user,
please click the following link to get your free smart phone http://www.freesmartphone.it:8080/survey.php

Which of of the following should the administrator do to prevent all employees from accessing the link in the above email, while still allowing Internet access to the freesmartphone.it domain?

A. Add http://www.freesmartphone.it:8080/survey.php to the browser group policy block list.
B. Add DENY TCP http://www.freesmartphone.it ANY EQ 8080 to the firewall ACL
C. Add DENY IP ANY ANY EQ 8080 to the intrusion detection system filter
D. Add http://www.freesmartphone.it:8080/survey.php to the load balancer

Correct Answer: A

CompTIA Network+ Question B-10

A new threat is hiding traffic by sending TLS-encrypted traffic outbound over random ports. Which of the following technologies would be able to detect and block this traffic?

A. Intrusion detection system
B. Application aware firewall
C. Stateful packet inspection
D. Stateless packet inspection

Correct Answer: C

CompTIA Network+ Question A-36

A company has seen an increase in ransomware across the enterprise. Which of the following should be implemented to reduce the occurrences?

A. ARP inspection
B. Intrusion detection system
C. Web content filtering
D. Port filtering

Correct Answer: C

Explanation:
Ransomware is a type of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator(s) of the malware in order for the restriction to be removed.
The best way to avoid ransomware include proactive measures like the following: Don’t click on any URL or open an attachment you are not expecting.
Implement an email content filtering service Install a web content filtering service
Invest in leading end point security software solutions

CompTIA A+ Core 2 Question F-23

A technician recently setup a new wired network and wants to ensure only their computers can use it. Which of the following is the MOST secure way to accomplish this?

A. Make sure the computers are using strong passwords.
B. Enable an intrusion detection system.
C. Assign the computers static IP addresses.
D. Disable the extra ports on the router.

CompTIA A+ Core 2 Question C-3

Emily, an employee, stepped away from her workstation to deliver a report to her boss. When she came back, confidential material was displayed on the screen that was not opened prior to her leaving. Which of the following could have mitigated this from occurring?

A. Intrusion detection system
B. Screensaver password
C. Privacy filters
D. RFID badges

Correct Answer: B