CompTIA A+ Core 2 Objective 2.6 Security – Workstation Best Practice

Posted by:

|

On:

|

Workstation Best Practices

1 / 14

In an effort to enhance workstation security, the IT department is drafting a guideline document for end-users. Which of the following practices should be included to ensure physical and digital security of the workstations?

2 / 14

To prevent unauthorized access, a company policy mandates that all workstations should automatically activate a screen saver lock requiring a password upon resumption. What is the most effective way to implement this policy across all company workstations?

3 / 14

During a routine security audit, it was discovered that several workstations still use the default administrator passwords, posing a significant security risk. What action should the IT security team take to address this issue across all company workstations?

4 / 14

An IT security training session is being conducted to educate employees about password best practices for their workstations. Which of the following guidelines should be emphasized as a best practice?

5 / 14

An organization aims to enhance the security of its workstations against unauthorized changes to firmware settings and to ensure that only trusted operating systems boot. What combination of security measures should be implemented to meet these objectives?

6 / 14

To enhance security measures within the organization, the IT department decides to secure the boot process of all company workstations. Which of the following is the most appropriate action to achieve this goal?

7 / 14

To tighten security measures, a company’s IT department is reviewing user account configurations on all corporate workstations. Given the need to prevent unauthorized access to sensitive information, what policy regarding guest accounts should be adopted?

8 / 14

A security consultant is advising a company on strengthening its password policies to safeguard against unauthorized access. Which of the following recommendations aligns best with current security best practices?

9 / 14

The IT department is revising its account management policies to tighten security across the company’s workstations. Which of the following policy changes would most effectively improve workstation security?

10 / 14

To minimize the risk of accidental or intentional system changes that could compromise security, a corporate IT policy now requires that user permissions on all workstations be carefully managed and restricted. What is the best approach for implementing this policy?

11 / 14

A new cybersecurity threat exploits the AutoRun and AutoPlay features in Windows to automatically execute malicious software from USB drives. The IT department must quickly mitigate this risk across all company workstations. What is the best course of action?

12 / 14

Employees at a consulting firm frequently work from public spaces, such as coffee shops and libraries. The IT department is concerned about the physical security of laptops and mobile workstations in these environments. Which of the following measures should be prioritized to mitigate the risk of theft or unauthorized access?

13 / 14

A company’s IT policy mandates that all workstations must have data-at-rest encryption enabled to protect sensitive data. Which of the following actions should an IT technician take to comply with this policy?

14 / 14

An organization wants to ensure that its workstations are not left unattended and unlocked, posing a security risk. Which of the following practices should be enforced to address this concern?

Your score is

Exit