Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
CompTIA A+ Practice Tests Core 1 (220-1101) and Core 2 (220-1102)

You're reading from  CompTIA A+ Practice Tests Core 1 (220-1101) and Core 2 (220-1102)

Product type Book
Published in Nov 2023
Publisher Packt
ISBN-13 9781837633180
Pages 446 pages
Edition 1st Edition
Languages
Authors (2):
Ian Neil Ian Neil
Profile icon Ian Neil
Mark Birch Mark Birch
Profile icon Mark Birch
View More author details

Introduction

This chapter will test an exam candidate’s knowledge of security concepts, procedures, and security best practices. Threats and threat actors are constantly changing, and security professionals must understand how to recognize threats and mitigate them in different ways. Common environments that need to be secured include wireless networks, small office/home office (SOHO) networks, enterprise networks, and situations where securing remote access is crucial. Mobile devices and support for IoT also present many challenges for security professionals. It is important to understand the threats posed by social engineering, often referred to as hacking humans (where users are targeted). To mitigate these threats, it is important to recognize the correct controls that need to be enabled and to understand the correct response to specific threats.

In order to be successful in the CompTIA A+ Core 2 (220-1102) certification exam, candidates must be familiar with the following...

Practice Exam Questions

8.1 Summarize various security measures and their purposes

  1. What is the purpose of a motion sensor in a security system?
    1. To detect the presence of unauthorized individuals or objects
    2. To control the temperature of the surrounding environment
    3. To amplify the sound of nearby movements
    4. To adjust the brightness of the lighting system
  2. A CISO is proposing to use an app on company-deployed smartphones as a soft token. What is the purpose of a soft token?
    1. Generating secure passwords
    2. Authenticating user identity
    3. Encrypting data
    4. Blocking malicious websites
  3. A call center manager is proposing to support an initiative where workers will be able to work from home. The security team is discussing methods that will allow the use of personal equipment and the control and management of employees’ personal devices. Which of the following controls allows the team to manage this infrastructure and ensure users are given guidance to support this initiative? (Choose two...
lock icon The rest of the chapter is locked
You have been reading a chapter from
CompTIA A+ Practice Tests Core 1 (220-1101) and Core 2 (220-1102)
Published in: Nov 2023 Publisher: Packt ISBN-13: 9781837633180
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime}