CompTIA A+ 220-701/702 Practice Exam - Question List

Select how would you like to study

76. A user is concerned with the security of his laptop’s BIOS. The user would not like anyone to be able to access control functions except themselves. Which of the following could make the BIOS more secure?
  1. Password
  2. Flash the BIOS
  3. Encrypt the hard drive
  4. Create an ACL
77. A technician deploys a computer in a public library and wants to create user accounts with limited permissions. Which of the following accounts would the technician setup?
  1. Limited user accounts
  2. Back up user account
  3. Power user account
  4. Administrator user account
78. A technician is conducting a forensics analysis on a computer system. Which step should be taken first?
  1. Get a binary copy of the system
  2. Search for Trojans
  3. Look for hidden files
  4. Analyze temporary files
79. A newly hired security specialist is asked to evaluate a company's network security. The security specialist discovers that users have installed personal software, the network OS has default settings, no patches have been installed, and passwords are not required to be changed regularly. Which of the following would be the first step to take?
  1. Enforce the security policy
  2. Install software patches
  3. Disable non-essential services
  4. Password management
80. Which of the following is the major difference between a worm and a Trojan horse?
  1. Worms are self replicating while Trojan horses are not.
  2. Worms spread via e-mail while Trojan horses are not.
  3. Worms are a form of malicious code while Trojan horses are not.
  4. There is no difference.

Select how would you like to study