CompTIA Network+ Question C-73

A company is implementing enhanced user authentication for system administrators accessing the company’s confidential servers. Which of the following would be the BEST example of two-factor authentication?

A. ID badge and keys
B. Password and key fob
C. fingerprint scanner and retina scan
D. Username and password

Correct Answer: B

CompTIA Network+ Question B-68

A company wants to make sure that users are required to authenticate prior to being allowed on the network. Which of the following is the BEST way to accomplish this?

A. 802.1x
B. 802.1p
C. Single sign-on
D. Kerberos

Correct Answer: A

Explanation:
For security purposes, some switches require users to authenticate themselves (that is, provide credentials, such as a username and password, to prove who they are) before gaining access to the rest of the network. A standards-based method of enforcing user authentication is IEEE 802.1X.

CompTIA Network+ Question A-71

Two weeks after installation, a network technician is now unable to log onto any of the newly installed company switches. The technician suspects that a malicious user may have changed the switches’ settings before they were installed in secure areas. Which of the following is the MOST likely way in which the malicious user gained access to the switches?

A. Via SSH using the RADIUS shared secret
B. Via HTTP using the default username and password
C. Via console using the administrator’s password
D. Via SNMP using the default RO community

Correct Answer: B

Explanation:
A new network switch is accessed via HTTP to perform the initial configuration. The username and password used is a factory default.

CompTIA A+ Core 2 Question I-67

Which of the following common security threats could be occurring when a user receives an email with a link to login and change their username and password?

A. Phishing
B. DDoS
C. Malware
D. Spoofing

Correct Answer: A

CompTIA A+ Core 2 Question I-6

An administrator sets up a wireless device that they will need to manage across the Internet. Which of the following security measures would BEST prevent unauthorized access to the device from the Internet?

A. Set the channels to wireless 802.11n only
B. Change the default username and password
C. Enable the wireless APs MAC filtering
D. Enable the wireless APs WPA2 security

Correct Answer: B

CompTIA A+ Core 2 Question D-57

A user receives an unsolicited email stating that they need to follow a link to change their username and password because their bank account has been compromised. Of which of the following is this an example?

A. SPAM
B. Spyware
C. Phishing
D. Malware

Correct Answer: C

CompTIA A+ Core 2 Question A-78

Peter, an end-user, reports that the Windows PC he is using automatically locks when he leaves his desk and walks to a printer to retrieve documents. Peter is then required to type in his username and password to unlock the computer. The technician looks at the settings on the PC and notices that the screensaver and screen- lock options are grayed out on the computer and cannot be changed. Which of the following is the MOST likely cause of this issue?

A. Domain-level group policies
B. Antivirus domain-level policies
C. Corrupted registry settings
D. Incorrect local-level user policies

Correct Answer: A

CompTIA A+ Core 2 Question A-29

Jane, an end user, receives a call from someone claiming to be from the help desk and asking for her username and password to prevent her email box from being deleted immediately. Which of the following BEST describes this type of attack?

A. Shoulder surfing
B. Man-in-the-middle
C. Social engineering
D. Ransomware

Correct Answer: C