CompTIA A+ Security Practice Test Core 2 Exam 220-1102

Last Updated on January 16, 2025

CompTIA A+ Security Practice Test Core 2 Exam 220-1102. Try our free sample multiple-choice review questions and answers on Chapter 2, Security Practice Test Core 2 Certification Exam 220-1102.

The security domain represents 25 percent of the total exam. This chapter focuses on the exam topics related to security. It follows the structure of the CompTIA A+ 220-1102 exam blueprint, objective 2, and it explores the 10 sub-objectives you need to master before taking the exam.

CompTIA A+ Security Practice Test Core 2 Exam 220-1102

To properly secure a network environment, you must understand the available security mechanisms, their purpose, and their operation. It is also essential to match the technique with the vulnerability it is meant to address. In this section, you’ll learn about security measures and when to implement them.

Certification Name CompTIA A+
Exam Details Core 2 Exam 220-1102
Topics Chapter 2 Security
Exam Mode Online
Total Items 20
Time Duration N/A
0%
0

CompTIA A+ Chapter 7 Security

1 / 20

1) Which of the following should always be changed from the default?

2 / 20

2) Which of the following is the term used for someone being so close to you when you enter a building that they are able to come in right behind you without needing to use a key, card, or other security device?

3 / 20

3) Which of the following was created as a first stab at security for wireless devices?

4 / 20

4) Which of the following was used to increase security in WPA?

5 / 20

5) Which of the following is a series of two doors with a small room between them?

6 / 20

6) Which of the following is the process of masquerading as another user or device?

7 / 20

7) Which of the following is used to ensure integrity?

8 / 20

8) What principle should drive the granting of permissions?

9 / 20

9) Which NTFS permission is the least required to run a program?

10 / 20

10) Which method deletes all content on a lost mobile device?

11 / 20

11) Which Windows group allows members to install most software but keeps them from changing key operating system files?

12 / 20

12) Which of the following was a concept designed to make it easier for less knowledgeable users to add a new client to the WLAN without manually entering the security information?

13 / 20

13) Which type of screen lock uses gestures?

14 / 20

14) What element of a virus uniquely identifies it?

15 / 20

15) In which filtering is the type of filtering done on a router or firewall?

16 / 20

16) Which of the following passwords is the strongest?

17 / 20

17) Which method of destroying the data on a hard drive is most effective?

18 / 20

18) Which type of virus covers itself with protective code that stops debuggers or disassemblers from examining critical elements of the virus?

19 / 20

19) Which of the following involves applying a strong magnetic field to wipe the media?

20 / 20

20) Which of the following physical characteristics is used to identify the user?

See also: