top of page

CompTIA A plus Questions Part 2

Do you want to help Professor JROD with his research?
Click here
https://qfreeaccountssjc1.az1.qualtrics.com/jfe/form/SV_3eJ4L1Fcj5w9jBc


Join Technology Tap Premium, and you can be eligible to win one voucher for either CompTIA A+ (1101 or 1102), Network Plus, or Security Plus. We will hold a raffle on June 1st, August 1st, October 1st, and December 1st.
To qualify for a free voucher, you must be a Technology Tap Premium subscriber for at least three months. 

Only one voucher winner per household. 
Only one voucher per raffle date

https://www.buzzsprout.com/1473469/subscribe

Let's ask Questions

CompTIA Questions are critical thinking questions. You have to actually read the question 

Question 1

A technician is configuring a network switch to be used in a publicly accessible location. Which of the following should the technician configure on the switch to prevent unintended connections?

A. DHCP Snooping
B. Geofencing
C. Port security 
D. Secure SNMP

Question 2

A network administrator is required to ensure that auditors have read-only access to the system logs, while systems administrators have read and write access to the system logs, and operators have no access to the system logs. The network administrator has configured security groups for each of these functional categories. Which of the following security capabilities will allow the network administrator to maintain these permissions with the LEAST administrative effort?
A. Mandatory access control
B. User-based permissions
C. Role-based access

D. Least Privilege

Question 3

Users attending security training at work are advised not to use single words as passwords for corporate applications. Which of the following does this BEST protect against?
A. An on-path attack
B. A brute-force attack
C. A dictionary attack 
D. MAC spoofing
E. Denial of service

Question 4

A network administrator wants to analyze attacks directed toward the company's network. Which of the following must the network administrator implement to assist in this goal?
A. A honeypot
B. Network segmentation
C. Antivirus
D. A screened subnet

Question 5
 

A network engineer configured new firewalls with the correct configuration to be deployed to each remote branch. Unneeded services were disabled, and all firewall rules were applied successfully. Which of the following should the network engineer perform NEXT to ensure all the firewalls are hardened successfully?
A. Ensure an implicit permit rule is enabled
B. Configure the log settings on the firewalls to the central syslog server
C. Update the firewalls with current firmware and software 
D. Use the same complex passwords on all firewalls

Question 6
 

A technician is connecting multiple switches to create a large network for a new office. The switches are unmanaged Layer 2 switches with multiple connections between each pair. The network is experiencing an extreme amount of latency. Which of the following is MOST likely occurring?
A. Ethernet collisions
B. A DDoS attack
C. A broadcast storm 
D. Routing loops

Question 7
 

Question 8
 

Question 9
 

Question 10
 

A

Question 11
 


 

Question 12
 

bottom of page