CompTIA Network+ Question C-55

A wireless network technician for a local retail store is installing encrypted access points within the store for real-time inventory verification, as well as remote price checking capabilities, while employees are away from the registers. The store is in a fully occupied strip mall that has multiple neighbors allowing guest access to the wireless networks. There are a finite known number of approved handheld devices needing to access the store’s wireless network. Which of the following is the BEST security method to implement on the access points?

A. Port forwarding
B. MAC filtering
C. TLS/TTLS
D. IP ACL

Correct Answer: B

Explanation:
MAC filtering allows traffic to be permitted or denied based on a device’s MAC address. We make a MAC filtering which contains the MAC addresses of all approved devices that need to access the wireless network. This ensures that only approved devices are given access to the network.

CompTIA Network+ Question A-1

A company has decided to update their usage policy to allow employees to surf the web unrestricted from their work computers. Which of the following actions should the IT security team implement to help protect the network from attack as a result of this new policy?

A. Install host-based anti-malware software
B. Implement MAC filtering on all wireless access points
C. Add an implicit deny to the core router ACL
D. Block port 80 outbound on the company firewall
E. Require users to utilize two-factor authentication

Correct Answer: A

Explanation:
To protect the computers from employees installing malicious software they download on the internet, antimalware should be run on all systems.
After a single machine in a company is compromised and is running malicious software (malware), the attacker can then use that single computer to proceed further into the internal network using the compromised host as a pivot point. The malware may have been implemented by an outside attacker or by an inside disgruntled employee.

CompTIA A+ Core 2 Question J-98

An administrator has taken steps to secure a SOHO wired network, but as a result the users report that they can no longer access the Internet but can still see other computers on the network. Which of the following would have caused this issue?

A. Port 80 has been disabled
B. Port 3389 has been enabled
C. MAC filtering has been enabled
D. LDAP has been disabled

Correct Answer: A

Explanation:
http://en.wikipedia.org/wiki/TCP_port

CompTIA A+ Core 2 Question J-36

A client requests a small SOHO wireless network setup. The client has only three devices that will require access to the Internet. The client is also concerned that a neighboring business will attempt to access the Internet without permission. Which of the following should the technician ensure when setting up the SOHO network? (Select TWO).

A. Enable client isolation
B. Lower radio power levels
C. Physically secure the access point
D. Disable unused ports
E. Enable MAC filtering
F. Enable short preambles

Correct Answer: BE

CompTIA A+ Core 2 Question J-29

A user has moved into a building and is installing a new wired network. There is existing cabling throughout the building. The user would like to prevent hardware that they do not own from connecting to the network. Which of the following actions would BEST prevent outside users from connecting?

A. Enable static IPs
B. Disable DNS
C. Disable local proxy server
D. Enable MAC filtering

Correct Answer: D

CompTIA A+ Core 2 Question J-26

A company recently had a security breach and is now required to increase the security on their workstations. A technician has been tasked to harden all the workstations on the network. Which of the following should the technician do?

A. Enable Windows automatic updates
B. Enable screensaver required passwords
C. Enable MAC filtering
D. Enable wireless encryption

CompTIA A+ Core 2 Question J-18

When setting up a new wireless router, which of the following actions should the technician take FIRST in order to secure the network? (Select TWO).

A. Disable unused ports
B. Change the SSID
C. Position the antennas to prevent outside access
D. Enable MAC filtering
E. Change the default user name

Correct Answer: BE

Explanation:
The basic tasks to secure a network is to change SSID and the default user name. This is the basic security a user can employ to secure the network immediately.

CompTIA A+ Core 2 Question I-40

A SOHO has had several issues with various unauthorized devices consuming the network’s bandwidth. There are only four network devices that are authorized to access the Internet as well as the local LAN’s resources. Which of the following security implementations would MOST likely help disable network access to the unauthorized devices?

A. Using complex passwords
B. Disabling the use of static IP addresses
C. Disabling ports
D. MAC filtering

Correct Answer: D

CompTIA A+ Core 2 Question I-32

A technician is installing a webcam in a nursery for a user to monitor their baby. The user wants to ensure that the webcam is not broadcasting externally. Which of the following would the technician implement on the SOHO router to prevent the broadcast?

A. Enable MAC filtering
B. Enable static IPs
C. Block the outbound port
D. Change the default SSID

CompTIA A+ Core 2 Question I-6

An administrator sets up a wireless device that they will need to manage across the Internet. Which of the following security measures would BEST prevent unauthorized access to the device from the Internet?

A. Set the channels to wireless 802.11n only
B. Change the default username and password
C. Enable the wireless APs MAC filtering
D. Enable the wireless APs WPA2 security

Correct Answer: B