CompTIA 220-801 Certification Practice Test - Question List

Select how would you like to study

76.

A newly hired security specialist is asked to evaluate a company's network security. The security specialist discovers that users have installed personal software, the network OS has default settings, no patches have been installed, and passwords are not required to be changed regularly. Which of the following would be the first step to take?

  1. Establish and enforce a security policy
  2. Install software patches
  3. Disable non-essential services
  4. Password management
77. Which of the following is the major difference between a worm and a Trojan horse?
  1. Worms are self replicating while Trojan horses are not.
  2. Worms spread via e-mail while Trojan horses are not.
  3. Worms are a form of malicious code while Trojan horses are not.
  4. There is no difference.
78. John wants to transfer some information to his computer from his friend’s USB drive. Which of the following should he do before transferring information?
  1. Scan the USB drive for viruses and other malicious codes.
  2. Nothing needs to be done. Transfer information.
  3. Ask his friend to scan the USB drive in his computer.
  4. Insert the USB drive on the computer and check if it works.
79. Which of the following is a method of removing or bypassing a BIOS password?
  1. Remove the CMOS battery
  2. Change memory card
  3. Re-connect all drive cables to the motherboard
  4. Restart the computer
80. John is concerned about users using thumb drives to connect to USB ports on company workstations, contemplating a data theft of sensitive files. What should he do to fix this concern?
  1. Disable USB in the workstation BIOS
  2. Seal all USB ports
  3. Install Antivirus
  4. Install Firewall

Select how would you like to study