Which of the following is considered a method of physical security?
A. Strong passwords
B. Cipher locked doors
C. NTFS
D. Firewall
CompTIA exam questions
Which of the following is considered a method of physical security?
A. Strong passwords
B. Cipher locked doors
C. NTFS
D. Firewall
Which of the following is the BEST way to secure a workstation which is shared by multiple users using the same guest account?
A. Implement strong password requirements.
B. Use a password protected screensaver.
C. Restrict the guest accounts privileges.
D. Change the guest account default name.
A user has asked for a recommendation for a strong password. Which of the following passwords is the STRONGEST?
A. password!
B. Pa$sw0rd
C. pa$4w0rd
D. thisismypsswrd1
A user has a perimeter firewall and up-to-date antivirus software. The user is asking what else they can do to improve their security. Which of the following will have the MOST impact on network security? (Select TWO).
A. Install additional antivirus software
B. Disable screen savers
C. Conduct a daily security audit
D. Assign security rights based on job roles
E. Use strong passwords
Which of the following is the BEST example of a physical security barrier?
A. Firewall
B. Cypherlock
C. Strong passwords
D. BitLocker
Which of the following helps to prevent virus infections from USB flash drives?
A. Strong passwords
B. Password protected screen savers
C. Disabling the guest account
D. Disabling the autorun feature
Which of the following would be the BEST way to combat social engineering?
A. User education
B. Deny social networks through the firewall
C. Badges
D. Strong password usage
A technician recently setup a new wired network and wants to ensure only their computers can use it. Which of the following is the MOST secure way to accomplish this?
A. Make sure the computers are using strong passwords.
B. Enable an intrusion detection system.
C. Assign the computers static IP addresses.
D. Disable the extra ports on the router.
Which of the following, when implemented on an unsupervised public kiosk which is used by walk-ins, increases its security posture the MOST?
A. Rename the administrator account.
B. Implement a screensaver.
C. Use strong passwords.
D. Disable guest access.
Which of the following can a technician implement to ensure that only company owned mobile devices can connect to the wireless network?
A. Deploy a script to auto-configure employees mobile devices wireless settings.
B. Configure MAC address filtering on the access points.
C. Implement a wireless policy and train all users.
D. Enable WPA2-Personal with a strong password.