Home > Articles


  • Print
  • + Share This

In this sample chapter from CompTIA A+ Core 1 (220-1001) and Core 2 (220-1002) Cert Guide, 5th Edition, you will review exam objectives related to security, including physical security measures, logical security concepts, wireless security protocols and authentication, social engineering threats and vulnerabilities, best practices to secure a workstation, and more.

This chapter is from the book

This chapter covers the 10 A+ 220-1002 exam objectives related to security. These objectives may comprise 24 percent of the exam questions:

  • Core 2 (220-1002): Objective 2.1: Summarize the importance of physical security measures.

  • Core 2 (220-1002): Objective 2.2: Explain logical security concepts.

  • Core 2 (220-1002): Objective 2.3: Compare and contrast wireless security protocols and authentication methods.

  • Core 2 (220-1002): Objective 2.4: Given a scenario, detect, remove, and prevent malware using appropriate tools and methods.

  • Core 2 (220-1002): Objective 2.5: Compare and contrast social engineering, threats, and vulnerabilities.

  • Core 2 (220-1002): Objective 2.6: Compare and contrast the differences of basic Microsoft Windows OS security settings.

  • Core 2 (220-1002): Objective 2.7: Given a scenario, implement security best practices to secure a workstation.

  • Core 2 (220-1002): Objective 2.8: Given a scenario, implement methods for securing mobile devices.

  • Core 2 (220-1002): Objective 2.9: Given a scenario, implement appropriate data destruction and disposal methods.

  • Core 2 (220-1002): Objective 2.10: Given a scenario, configure security on SOHO wireless and wired networks.

The most important asset most companies own is their data. Data has become so important to business success that it is what most thieves seek. Because of the interconnected nature of the Internet, a security breach of a single device or network can lead to data theft, including the theft of client financial data that can greatly affect the lives of millions. Large-scale data breaches have brought large companies to bankruptcy, so data security is among the top concerns of business leadership. In this chapter, you learn about the multifaceted threats to security in the modern computing environment and how to mitigate them through the study of these CompTIA A+ Core 2 objectives. This chapter covers the following topics:

  • Physical security measures: Physical security practices and their implementation.

  • Logical security concepts: Software-based security measures.

  • Wireless security protocols and authentication: Types of wireless security and authentication.

  • Malware removal and prevention: Methods and protocols for detection and prevention.

  • Social engineering threats and vulnerabilities: The various types of threats.

  • Microsoft Windows OS security settings: The important Microsoft security settings.

  • Security best practices to secure a workstation: Implementation of best practices.

  • Securing mobile devices: Implementation methods for securing devices.

  • Data destruction and disposal: Methods and techniques for safely and securely disposing of hardware.

  • Configuring security on SOHO networks: Methods for configuring SOHO security.

“Do I Know This Already?” Quiz

The “Do I Know This Already?” quiz allows you to assess whether you should read the entire chapter. Table 7-1 lists the major headings in this chapter and the “Do I Know This Already?” quiz questions covering the material in those headings so you can assess your knowledge of these specific areas. The answers to the “Do I Know This Already?” quiz appear in Appendix A, “Answers to the ‘Do I Know This Already?’ Quizzes and Review Question Sections.”

Table 7-1 “Do I Know This Already?” Section-to-Question Mapping

Foundation Topics Section


Physical Security Measures


Logical Security Concepts


Wireless Security Protocols and Authentication


Social Engineering Threats and Vulnerabilities


Microsoft Windows OS Security Settings


Security Best Practices to Secure a Workstation


Securing Mobile Devices


Data Destruction and Disposal


Configuring Security on SOHO Networks


1. What kind of security breach is a mantrap designed to foil?

  • a. Biometric

  • b. Tailgating

  • c. Sleeping guard

  • d. Shoulder surfing

2. Say that you have been asked to improve security by adding a system to examine network packets to determine whether they should be forwarded or blocked. What is the function you would be most likely to add?

  • a. MAC address filtering

  • b. MAC address cloning

  • c. Software firewall

  • d. Multifactor authentication

3. Which of the following is the most secure wireless protocol in use today?

  • a. WEP

  • b. WEP3

  • c. TKIP

  • d. WPA2

4. A user has unwittingly downloaded malware while also downloading a free application on a gaming site. What general term describes the unintentionally downloaded file?

  • a. Worm

  • b. Trojan

  • c. Ransomware

  • d. Botnet

5. Several computers on a network have been commandeered to launch an attack on a server on the Web. Which term best describes this situation?

  • a. Phishing

  • b. DoS

  • c. Spoofing

  • d. DDoS

6. Which setting allows the user the most privileges on a Windows network?

  • a. Modify

  • b. Read and Execute

  • c. Ultimate Use

  • d. Write

7. Which is the best example of a strong password?

  • a. dr0wssap

  • b. Password9

  • c. Pa5SwoRd5

  • d. pA55wrds

8. Which of the following is not an example of biometric authentication?

  • a. Entering a password and answering a secret question

  • b. Apple FACE ID

  • c. Windows Hello

  • d. Touch ID

9. Which method erases storage media but leaves the device intact?

  • a. Data shredding

  • b. Degaussing

  • c. BitLocking

  • d. Incineration

10. To help hide the identity of a wireless router, what should be changed from the default setting?

  • a. Private IP address

  • b. MAC address filter

  • c. IP default gateway

  • d. Service set identifier

Foundation Topics

  • + Share This
  • 🔖 Save To Your Account