New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

220-1002 Leak Questions

Page: 7 / 25
Total 665 questions

CompTIA A+ Certification Exam: Core 2 Questions and Answers

Question 25

With which of the following types is a man-in-the-middle attack associated?

Options:

A.

Brute force

B.

Spoofing

C.

DDoS

D.

Zero-day

Question 26

A corporate network was recently infected by a malicious application on a flash drive that downloaded sensitive company files and injected a virus, which spread onto the network Which of the following best practices could have prevented the attack?

Options:

A.

Implementing strong passwords

B.

Changing default credentials

C.

Disabling AutoRun

D.

Removing Guest account

E.

Encrypting data

Question 27

A network administrator has noticed unusual activity with a user’s login credentials on the network. The user is attempting multiple simultaneous login across the network, some of which are attempting to access workstations and servers to which the user does not have access.

Which of the following should the network administrator do NEXT?

Options:

A.

Delete the user’s AD account.

B.

Decrease the user’s AD privileges.

C.

Disable the user’s AD account.

D.

Reset the password on the user’s AD account.

Question 28

Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?

Options:

A.

SSO

B.

Permission propagation

C.

Inheritance

D.

MFA

Page: 7 / 25
Total 665 questions