CompTIA A+ Core 2 Question H-28

A technician needs to change the minimum password length to 8 characters to make it more secure. Which of the following system settings should the technician configure?

A. Windows Firewall
B. Windows Security Center
C. Local Security Policy
D. System Configuration

CompTIA A+ Core 2 Question H-1

A company has created a personal SSL certificate for an internal website and a user is reporting error messages when accessing the site. In which of the following locations could a technician troubleshoot SSL certificate errors?

A. System Protection
B. Folder Options->View Hidden Files
C. Internet Options->Content
D. Local Security Policy

Correct Answer: C

CompTIA A+ Core 2 Question G-22

A technician is tasked with changing the account lockout threshold to 30 minutes in Windows 7. Which of the following should the technician use to accomplish this task?

A. User Access Control
B. Windows Security Center
C. Local Security Policy
D. Users and Groups

CompTIA A+ Core 2 Question D-96

A technician is trying to setup a non-domain user account on a workstation, but receives the following error message “Password does not meet the complexity requirements.” Which of the following utilities should the technician use to identify the criteria?

A. Local Security Policy
B. Users and Groups
C. Performance Monitor
D. MSCONFIG

CompTIA A+ Core 2 Question C-94

A technician has a computer locked in a cabinet in the office that shares a printer and some files. The computer must remain on. Which of the following Control Panel options would be used to control the users that are able to shut the computer down?

A. Power options
B. Security center
C. Local security policy
D. System

Correct Answer: C

CompTIA A+ Core 2 Question B-17

A user, Jane, has reported that she lost a laptop. The laptop had sensitive corporate information on it that has been published on the Internet. Which of the following is the FIRST step in implementing a best practice security policy?

A. Require biometric identification to log into the laptop.
B. Require multifactor authentication to log into laptop.
C. Require laptop hard drives to be encrypted.
D. Require users to change their password at frequent intervals.
E. Require users to have strong passwords.

Correct Answer: C