Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
CompTIA A+ Core 2 Exam Guide to Operating Systems and Security
Quiz 8: Security Strategies and Documentation
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
David would like to add extra security to his network device. He is afraid that someone might try and connect an unauthorized device to the network via an open network drop. What type of security can David deploy to prevent this type of security issue from occurring?
Question 22
Multiple Choice
Becky has been assigned to help with a major change to her company's accounts database. During the time of the change, Becky notices that her task will need to be modified to complete the change. Instead of telling her supervisor, she determines that the minor detail must have been overlooked and fixes what she believes is the problem. The minor detail that Becky did not tell her supervisor causes the change to fail. What is Becky's mistake called?
Question 23
Multiple Choice
While researching a network issue, Randy discovered a diagram that he can use to see the design of the network. What type of documentation did Randy discover?
Question 24
Multiple Choice
An operating system is responsible for validating certificates used to secure communication. For Windows, Microsoft maintains a database of trusted root certificates issued by Certificate Authorities (CAs) . A root certificate is the original certificate issued by the CA. When a Windows system opens a secure email or visits a secure website and encounters a new digital certificate, it requests Microsoft's trusted root certificate, which is downloaded to the computer. The download happens seamlessly without the user's knowledge unless there's a problem. If Windows cannot obtain the root certificate to validate the email or website, an error is displayed. Where do you go in the Windows operating system to view and delete root certificates?
Question 25
Multiple Choice
Victoria is working on a computer that was infected with a virus when a client clicked on a link and downloaded a Trojan. Victoria researched the virus and learned that the virus might have written itself into System Restore. What does Victoria need to do to run the antivirus software on System Restore?
Question 26
Multiple Choice
Sharon's company has written a new computer program, and she has been asked to find a way to prevent people from copying the software they purchase and giving it to others who have not purchased the software. What can Sharon's company do to make sure a customer who purchases the program does not give it to someone else?
Question 27
Multiple Choice
Lance works for a company that allows users to bring their own devices to work. Last week Lance purchased a software package from a company that allows him to change fonts on pictures that he uses in his work presentations. Lance wants to share the program with his coworker Susan. Is Lance allowed to share the software with Susan?
Question 28
Multiple Choice
Alexandria works for a non-for-profit company that asks for donations to help the homeless people in her community. Recently the database that holds all the contact information about the donners was hacked, and all the data was copied. What type of data was taken?
Question 29
Multiple Choice
Christian has malware that is preventing him from installing anti-malware on his laptop. What can Christian try if he does not have another computer available to run the anti-malware program?
Question 30
Multiple Choice
Jennifer's company currently uses Windows Active Directory to provide centralized authentication, authorization, and accounting to manage users on its network. The company uses a wireless network and an earlier authentication service on the server to authenticate end users accessing resources on the network. What type of service is Jennifer's company using?
Question 31
Multiple Choice
Roger's company is trying to increase the level of security for its network. Roger is researching ways to increase the security by making passwords more complex. What can Roger change in Windows to require more complex passwords?
Question 32
Multiple Choice
Based on her research of the symptoms, Sara believes her computer is infected with a virus. Sara has an anti-malware program on the computer. What should she do before she runs the anti-malware program?