A technician is configuring security for a computer that is located in a common are
a. A sign above the computer indicates only authorized users can use the computer. Guests visiting the office must walk past the computer to enter and leave the office. Which of the following will offer the best protection against physical threats?
Answer : D
The best protection against physical threats, especially in a common area where the computer is publicly accessible, involves physically securing the hardware.
Option A: Using screen lockScreen locks are good for securing access temporarily but do not protect against physical tampering or theft.
Option B: Installing a privacy screenPrivacy screens prevent visual access but do not secure the hardware.
Option C: Implementing password complexityPassword complexity helps secure digital access but does not prevent physical threats.
Option D: Locking the computer casePhysically securing the case prevents unauthorized individuals from tampering with internal components or stealing the computer.
Option E: Enabling drive encryptionEncryption protects data but does not prevent physical access to the hardware itself.
CompTIA A+ 220-1102 Objective 2.1 (Physical security), particularly physical security measures like locking the computer case.
A company-owned mobile device is displaying a high number of ads, receiving data-usage limit notifications, and experiencing slow response. After checking the device, a technician notices the device has been jailbroken. Which of the following should the technician do next?
Run an antivirus and enable encryption.
Answer : B
Jailbreaking a device exposes it to various security risks, such as malware, data theft, network attacks, and service disruption1234. Running an antivirus and enabling encryption may not be enough to remove the threats and restore the device's functionality. Undoing the jailbreak may not be possible or effective, depending on the method used. Backing up the files and doing a system restore may preserve the jailbreak and the associated problems. The best option is to erase the device and reinstall the original operating system that is compatible with the corporate policies and standards.This will ensure that the device is clean, secure, and compliant25.
A Microsoft Windows PC needs to be set up for a user at a targe corporation. The user will need access to the corporate domain to access email and shared drives. Which of the following versions of Windows would a technician MOST likely deploy for the user?
Answer : B
The Windows Professional Edition is the most likely version that a technician would deploy for a user at a target corporation. This version of Windows is designed for business use and provides the necessary features and capabilities that a user would need to access the corporate domain, such as email and shared drives.
A technician installs a Bluetooth headset for a user. During testing, the sound is still coming from the speaker on the computer. The technician verifies the headset shows up in Device Manager. Which of the following would the technician most likely do to fix this issue?
Answer : D
A technician is editing the hosts file on a few PCs in order to block certain domains. Which of the following would the technician need to execute after editing the hosts file?
Answer : D
Resetting the network adapter is the best way to apply the changes made to the hosts file on a few PCs. The hosts file is a text file that maps hostnames to IP addresses and can be used to block certain domains by redirecting them to invalid or local addresses.Resetting the network adapter will clear the DNS cache and force the PC to use the new entries in the hosts file.
Which of the following is a reason why PII is regulated?
Answer : D
Which of the following are mobile operating systems used on smartphones? (Select two).
Answer : E, F
iOS and Android are the two most popular and widely used mobile operating systems for smartphones. They are both based on Unix-like kernels and provide a variety of features and applications for users and developers. iOS is developed by Apple and runs exclusively on Apple devices, such as iPhones and iPads. Android is developed by Google and runs on a range of devices from different manufacturers, such as Samsung, Huawei, and Motorola. The other options are not mobile operating systems for smartphones, but rather for other types of devices or platforms. macOS is a desktop operating system for Apple computers, such as MacBooks and iMacs. Windows is a desktop operating system for Microsoft computers, such as Surface and Dell. Chrome OS is a web-based operating system for Google devices, such as Chromebooks and Chromecast. Linux is a family of open-source operating systems for various devices and platforms, such as Ubuntu, Fedora, and Raspberry Pi.