CompTIA A+ 220-701/702 Practice Exam - Question List

Select how would you like to study

121. John is complaining that the contacts in his mailbox are receiving continuous e-mails from his ID, without him actually sending anything. Which of the following could have caused this?
  1. DoS
  2. Sniffing
  3. TCP/IP hijacking
  4. Worm
122. Which of the following have the ability to hide certain processes and connections from the operating system?
  1. Rootkit
  2. Worm
  3. Botnet
  4. Logic Bomb
123. Which of the following terms describes the process of improving security on a Network Operating system?
  1. Patching
  2. Compression
  3. Encryption
  4. Hardening
124. Jack is a security advisor in his company. All users need to connect to an FTP server for data exchange using the FTP protocol. Considering the fact that FTP is an unsecure protocol, which of the following protocols should he replace the FTP protocol with?
  1. DNS
  2. HTTP
  3. TFTP
  4. SFTP
125. Which of the following is often misused by spyware to collect and report a user’s activities?
  1. Tracking cookie
  2. Session cookie
  3. Normal cookie
  4. Collection cookie

Select how would you like to study