CompTIA Network+ Question A-1

A company has decided to update their usage policy to allow employees to surf the web unrestricted from their work computers. Which of the following actions should the IT security team implement to help protect the network from attack as a result of this new policy?

A. Install host-based anti-malware software
B. Implement MAC filtering on all wireless access points
C. Add an implicit deny to the core router ACL
D. Block port 80 outbound on the company firewall
E. Require users to utilize two-factor authentication

Correct Answer: A

Explanation:
To protect the computers from employees installing malicious software they download on the internet, antimalware should be run on all systems.
After a single machine in a company is compromised and is running malicious software (malware), the attacker can then use that single computer to proceed further into the internal network using the compromised host as a pivot point. The malware may have been implemented by an outside attacker or by an inside disgruntled employee.

CompTIA A+ Core 2 Question I-27

A company has decided that all remote users need to use two-factor authentication to increase security. Several remote users have reported losing the RSA token and have replaced it several times. Which of the following is the solution for these users?

A. Use biometrics instead of the RSA token.
B. Remove the RSA token requirement for any user that has lost an RSA token.
C. Give the users with lost RSA tokens RFID badges instead.
D. Attach the RSA token to the lid of the laptop.

Correct Answer: A

CompTIA A+ Core 2 Question G-34

A company decides to implement two-factor authentication on all of the company computers. In addition to a user password, which of the following is a commonly used item to implement two-factor authentication?

A. Retinal scanner
B. Key Lock
C. RSA token
D. Privacy Filter

Correct Answer: C