CompTIA A+ Core 2 Question B-24

Which of the following will help to protect an organization from further data exposure AFTER a list of user passwords has already been leaked due to policy breach? (Select TWO).

A. Use multi-factor authentication
B. Require strong passwords
C. Enable file encryption
D. Educate end users
E. Restrict user permissions

Correct Answer: AD

CompTIA A+ Core 2 Question B-17

A user, Jane, has reported that she lost a laptop. The laptop had sensitive corporate information on it that has been published on the Internet. Which of the following is the FIRST step in implementing a best practice security policy?

A. Require biometric identification to log into the laptop.
B. Require multifactor authentication to log into laptop.
C. Require laptop hard drives to be encrypted.
D. Require users to change their password at frequent intervals.
E. Require users to have strong passwords.

Correct Answer: C

CompTIA A+ Core 2 Question B-3

A computer was recently infected by malware after a flash drive was plugged in. The user, Jane, indicates she never opened any files or folders from the flash drive. A technician needs to prevent this from occurring in the future. Which of the following would accomplish this?

A. BitLocker To Go
B. Set strong passwords
C. Disable usermin
D. Disable AutoRun

Correct Answer: D

CompTIA A+ Core 2 Question A-6

A user leaves the workstation frequently and does not want sensitive material to be accessed. In addition, the user does not want to turn off the computer every time in the evening. Which of the following is the BEST solution for securing the workstation?

A. Set a strong password that requires a renewal every 30 days.
B. Run a screensaver after one minute of nonuse and fingerprint lock for afterhours.
C. Apply a screen lock after five minutes of nonuse and login time restrictions for afterhours.
D. Require a password and fingerprint lock afterhours.

Correct Answer: C

CompTIA A+ Question K-3

A user works in a public kiosk where their laptop is susceptible to theft. The information can be remotely wiped so data loss is not a concern. Which of the following options should be considered to secure the laptop?

A. Use data encryption.
B. Use a cable lock.
C. Use multifactor authentication.
D. Use a strong password.

Correct Answer: B