Which of the following devices is BEST suited to protect an HTTP-based application that is susceptible to injection attacks?
A. Protocol filter
B. Load balancer
C. NIDS
D. Layer 7 firewall
CompTIA exam questions
Which of the following devices is BEST suited to protect an HTTP-based application that is susceptible to injection attacks?
A. Protocol filter
B. Load balancer
C. NIDS
D. Layer 7 firewall
A technician wants to prevent users in a computer lab from seeing the name of the last user who logged onto the computer after the user logs out from the workstation. Which of the following MUST the technician configure?
A. Screen saver advanced options
B. User access control
C. Local computer policy
D. Control Panel options
A technician is tasked with changing the account lockout threshold to 30 minutes in Windows 7. Which of the following should the technician use to accomplish this task?
A. User Access Control
B. Windows Security Center
C. Local Security Policy
D. Users and Groups
A user has recently purchased and installed a new top of the line video card for playing games on Windows 7. However, during game play the images are blurred and artifacts appear. Once the user returns to the Windows desktop, everything returns to normal. Which of the following could be the problem? (Select TWO).
A. The video card requires an adapter to output to the monitor
B. User Access Control is preventing the game from functioning
C. The video card requires a driver update
D. The game is not compatible with Windows 7
E. The graphics card is faulty and should be replaced
F. The IRQ channel must be appropriately set for the video card
A user has recently installed Windows 7 on a computer. They ran Windows updates, updated the firmware and installed a printer. The user accessed a P2P application and now they are getting a large amount of browser pop-ups. Which of the following is MOST likely the cause of the pop-ups?
A. Phishing
B. Malware
C. Proxy redirect
D. Firmware
Emily, an end-user, reports to Peter, a helpdesk technician, that her computer has been redirecting her browser to unknown websites when clicking on search results. Peter runs a malware scan and finds that her computer is infected with malware. Peter uses the anti- malware program to remove the infection but Emily reports that the problem resurfaced the next day. Peter runs the malware scan again and finds the same malware is still infecting Emily’s computer. Peter runs several passes of the malware scan to remove the infection but it keeps recurring. Which of the following would MOST likely aid in removing the infection?
A. Enable Windows User Access Control to ensure the user has proper rights to remove the infected files.
B. Disable Windows firewall as it may be conflicting with the malware scan.
C. Run the malware scan in Windows safe mode.
D. Change the desktops IP address to a different subnet.
A new user in a corporate HR department must print to a network printer. This printer is only used by the HR department for confidential documents. Which of the following is the FASTEST way to allow the user access to the printer?
A. Add the group Print Users to the HR group.
B. Add the new user to the Everyone group and give the group Print rights to the printer.
C. Add the group Everyone group to the HR group.
D. Add the new user to the HR group.
A user has forgotten their BIOS password on their computer. Which of the following would a technician use to allow the user access to their PC?
A. Remove the BIOS chip on the PC
B. Re-flash the BIOS
C. Run password cracking software on the user’s PC
D. Set the password clear jumper on the motherboard
Which of the following is enabled in the BIOS that will prompt a user, Peter, to enter his password every time the laptop performs a POST?
A. Power User access
B. Power on password
C. Administrative password
D. User profile access