: Mark Birch, Ian Neil
: CompTIA A+ Practice Test Core 2 (220-1102) Achieve certification by practicing with hundreds of mock questions and tests for each exam topic
: Packt Publishing
: 9781837632046
: 1
: CHF 13.80
:
: Sonstiges
: English
: 282
: DRM
: PC/MAC/eReader/Tablet
: ePUB

The CompTIA A+ Core 2 certification validates the knowledge you need to support common operating systems and software installations. This book tests the skills essential for you to secure computing environments and troubleshoot common computing issues, while adhering to operational procedures through practice questions.
Using proven techniques to test a candidate's knowledge of Core 2 (220-1102) exam objectives, this book will ensure that you're well-prepared to pass the exam on your first attempt. The chapters in this book comprise multiple-choice questions at the same level of difficulty as those you'll find in the official exam. All the questions are broken down into different chapters according to each exam domain, finishing with a 90-question mock exam to prepare you to confidently take the real exam. The chapters are designed in a way to not only test your knowledge, but also your ability to handle pressure during the exam.
By the end of this practice test book, you'll be well-prepared to pass the CompTIA A+ Core 2 exam with confidence.

2


Security


Introduction


This chapter will test an exam candidate’s knowledge of security concepts, procedures, and security best practices. Threats and threat actors are constantly changing, and security professionals must understand how to recognize threats and mitigate them in different ways. Common environments that need to be secured include wireless networks,small office/home office (SOHO) networks, enterprise networks, and situations where securing remote access is crucial. Mobile devices and support for IoT also present many challenges for security professionals. It is important to understand the threats posed by social engineering, often referred to as hacking humans (where users are targeted). To mitigate these threats, it is important to recognize the correct controls that need to be enabled and to understand the correct response tospecific threats.

In order to be successful in the CompTIA A+ Core 2 (220-1102) certification exam, candidates must be familiar with thefollowing objectives:

  • 2.1 Summarize various security measures andtheir purposes
  • 2.2 Compare and contrast wireless security protocols andauthentication methods
  • 2.3 Given a scenario, detect, remove, and prevent malware using the appropriate toolsand methods
  • 2.4 Explain common social-engineering attacks, threats,and vulnerabilities
  • 2.5 Given a scenario, manage and configure basic security settings in the MicrosoftWindows OS
  • 2.6 Given a scenario, configure a workstation to meet best practicesfor security
  • 2.7 Explain common methods for securing mobile andembedded devices
  • 2.8 Given a scenario, use common data destruction anddisposal methods
  • 2.9 Given a scenario, configure appropriate security settings on small office/home office (SOHO) wireless andwired networks
  • 2.10 Given a scenario, install and configure browsers and relevantsecurity settings

The rest of this chapter is committed to practice. For each of the previously defined concepts, you will be given a series of questions designed to test your knowledge of each core 2 objective as defined by the official certification exam guidance for this domain. These questions will test the candidate’s knowledge of how to implement security best practices withinan organization.

Practice Exam Questions


2.1 Summarize various security measures and their purposes


  1. What is the purpose of a motion sensor in asecurity system?
    1. To detect the presence of unauthorized individualsor objects
    2. To control the temperature of thesurrounding environment
    3. To amplify the sound ofnearby movements
    4. To adjust the brightness of thelighting system
  2. A CISO is proposing to use an app on company-deployed smartphones as a soft token. What is the purpose of asoft token?
    1. Generatingsecure