CompTIA Security+ Question B-44

Which of the following devices is BEST suited to protect an HTTP-based application that is susceptible to injection attacks?

A. Protocol filter
B. Load balancer
C. NIDS
D. Layer 7 firewall

Answer: D

Explanation:
An application-level gateway firewall filters traffic based on user access, group membership, the application or service used, or even the type of resources being transmitted. This type of firewall operates at the Application layer (Layer 7) of the OSI model.

CompTIA A+ Core 2 Question I-98

A technician wants to prevent users in a computer lab from seeing the name of the last user who logged onto the computer after the user logs out from the workstation. Which of the following MUST the technician configure?

A. Screen saver advanced options
B. User access control
C. Local computer policy
D. Control Panel options

Correct Answer: C

CompTIA A+ Core 2 Question G-22

A technician is tasked with changing the account lockout threshold to 30 minutes in Windows 7. Which of the following should the technician use to accomplish this task?

A. User Access Control
B. Windows Security Center
C. Local Security Policy
D. Users and Groups

CompTIA A+ Core 2 Question E-100

A user has recently purchased and installed a new top of the line video card for playing games on Windows 7. However, during game play the images are blurred and artifacts appear. Once the user returns to the Windows desktop, everything returns to normal. Which of the following could be the problem? (Select TWO).

A. The video card requires an adapter to output to the monitor
B. User Access Control is preventing the game from functioning
C. The video card requires a driver update
D. The game is not compatible with Windows 7
E. The graphics card is faulty and should be replaced
F. The IRQ channel must be appropriately set for the video card

Correct Answer: CE

CompTIA A+ Core 2 Question E-50

A user has recently installed Windows 7 on a computer. They ran Windows updates, updated the firmware and installed a printer. The user accessed a P2P application and now they are getting a large amount of browser pop-ups. Which of the following is MOST likely the cause of the pop-ups?

A. Phishing
B. Malware
C. Proxy redirect
D. Firmware

CompTIA A+ Core 2 Question D-61

Emily, an end-user, reports to Peter, a helpdesk technician, that her computer has been redirecting her browser to unknown websites when clicking on search results. Peter runs a malware scan and finds that her computer is infected with malware. Peter uses the anti- malware program to remove the infection but Emily reports that the problem resurfaced the next day. Peter runs the malware scan again and finds the same malware is still infecting Emily’s computer. Peter runs several passes of the malware scan to remove the infection but it keeps recurring. Which of the following would MOST likely aid in removing the infection?

A. Enable Windows User Access Control to ensure the user has proper rights to remove the infected files.
B. Disable Windows firewall as it may be conflicting with the malware scan.
C. Run the malware scan in Windows safe mode.
D. Change the desktops IP address to a different subnet.

Correct Answer: C

CompTIA A+ Question H-64

A new user in a corporate HR department must print to a network printer. This printer is only used by the HR department for confidential documents. Which of the following is the FASTEST way to allow the user access to the printer?

A. Add the group Print Users to the HR group.
B. Add the new user to the Everyone group and give the group Print rights to the printer.
C. Add the group Everyone group to the HR group.
D. Add the new user to the HR group.

Correct Answer: D