CompTIA Security+ Question K-14

A retail store uses a wireless network for its employees to access inventory from anywhere in the store. Due to concerns regarding the aging wireless network, the store manager has brought in a consultant to harden the network. During the site survey, the consultant discovers that the network was using WEP encryption. Which of the following would be the BEST course of action for the consultant to recommend?

A. Replace the unidirectional antenna at the front of the store with an omni-directional antenna.
B. Change the encryption used so that the encryption protocol is CCMP-based.
C. Disable the network’s SSID and configure the router to only access store devices based on MAC addresses.
D. Increase the access point’s encryption from WEP to WPA TKIP.

Answer: B

Explanation:
CCMP is the standard encryption protocol for use with the WPA2 standard and is much more secure than the WEP protocol and TKIP protocol of WPA. CCMP provides the following security services: Data confidentiality; ensures only authorized parties can access the information Authentication; provides proof of genuineness of the user Access control in conjunction with layer management

Incorrect Options:

A: The antenna type deals with signal strength and direction. It will not have a bearing on whether technology is older.

C: This option would “cloak” the network, not harden the network.

D: WPA2, which uses CCMP as its standard encryption protocol, more secure than WPA-TKIP.

Reference: http://en.wikipedia.org/wiki/CCMP http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access Stewart, James Michael, CompTIA Security+ Review Guide, Sybex, Indianapolis, 2014, pp. 61, 63

CompTIA Security+ Question J-18

A network administrator has been tasked with securing the WLAN. Which of the following cryptographic products would be used to provide the MOST secure environment for the WLAN?

A. WPA2 CCMP
B. WPA
C. WPA with MAC filtering
D. WPA2 TKIP

Answer: A

Explanation:
CCMP is the standard encryption protocol for use with the WPA2 standard and is much more secure than the WEP protocol and TKIP protocol of WPA. CCMP provides the following security services: Data confidentiality; ensures only authorized parties can access the information Authentication; provides proof of genuineness of the user Access control in conjunction with layer management

Because CCMP is a block cipher mode using a 128-bit key, it is secure against attacks to the 264 steps of operation.

CompTIA Security+ Question G-32

Which of the following is the BEST approach to perform risk mitigation of user access control rights?

A. Conduct surveys and rank the results.
B. Perform routine user permission reviews.
C. Implement periodic vulnerability scanning.
D. Disable user accounts that have not been used within the last two weeks.

Answer: B

Explanation:
Risk mitigation is accomplished any time you take steps to reduce risk. This category includes installing antivirus software, educating users about possible threats, monitoring network traffic, adding a firewall, and so on. User permissions may be the most basic aspect of security and is best coupled with a principle of least privilege. And related to permissions is the concept of the access control list (ACL). An ACL is literally a list of who can access what resource and at what level. Thus the best risk mitigation steps insofar as access control rights are concerned, is the regular/routine review of user permissions.

CompTIA A+ Core 2 Question I-98

A technician wants to prevent users in a computer lab from seeing the name of the last user who logged onto the computer after the user logs out from the workstation. Which of the following MUST the technician configure?

A. Screen saver advanced options
B. User access control
C. Local computer policy
D. Control Panel options

Correct Answer: C

CompTIA A+ Core 2 Question G-22

A technician is tasked with changing the account lockout threshold to 30 minutes in Windows 7. Which of the following should the technician use to accomplish this task?

A. User Access Control
B. Windows Security Center
C. Local Security Policy
D. Users and Groups

CompTIA A+ Core 2 Question E-100

A user has recently purchased and installed a new top of the line video card for playing games on Windows 7. However, during game play the images are blurred and artifacts appear. Once the user returns to the Windows desktop, everything returns to normal. Which of the following could be the problem? (Select TWO).

A. The video card requires an adapter to output to the monitor
B. User Access Control is preventing the game from functioning
C. The video card requires a driver update
D. The game is not compatible with Windows 7
E. The graphics card is faulty and should be replaced
F. The IRQ channel must be appropriately set for the video card

Correct Answer: CE

CompTIA A+ Core 2 Question D-61

Emily, an end-user, reports to Peter, a helpdesk technician, that her computer has been redirecting her browser to unknown websites when clicking on search results. Peter runs a malware scan and finds that her computer is infected with malware. Peter uses the anti- malware program to remove the infection but Emily reports that the problem resurfaced the next day. Peter runs the malware scan again and finds the same malware is still infecting Emily’s computer. Peter runs several passes of the malware scan to remove the infection but it keeps recurring. Which of the following would MOST likely aid in removing the infection?

A. Enable Windows User Access Control to ensure the user has proper rights to remove the infected files.
B. Disable Windows firewall as it may be conflicting with the malware scan.
C. Run the malware scan in Windows safe mode.
D. Change the desktops IP address to a different subnet.

Correct Answer: C