A user is setting up a computer for the first time and would like to create a secondary login with permissions that are different than the primary login. The secondary login will need to be protected from certain content such as games and websites. Which of the following Windows settings should the user utilize to create the secondary login?
Correct Answer:
B
To create a secondary login with different permissions in Windows 10, the user should utilize the Accounts setting. Here are the steps to create a new user account with different permissions:
✑ Right-click the Windows Start menu button.
✑ Select Control Panel.
✑ Select User Accounts.
✑ Select Manage another account.
✑ Select Add a new user in PC settings.
✑ Use the Accounts dialog box to configure a new account.1
A data center is required to destroy SSDs that contain sensitive information. Which of the following is the BEST method to use for the physical destruction of SSDs?
Correct Answer:
C
Shredding is the best method to use for the physical destruction of SSDs because it reduces them to small pieces that cannot be recovered or accessed. Wiping,
low-level formatting, and erasing are not effective methods for destroying SSDs because they do not physically damage the flash memory chips that store data1.
Which of the following environmental factors are most important to consider when planning the configuration of a data center? (Select two).
Correct Answer:
AC
Temperature and humidity levels are the most important environmental factors to consider when planning the configuration of a data center, as they directly affect the performance, reliability, and energy efficiency of the IT equipment. Excessive heat or moisture can cause overheating, corrosion, condensation, or static electricity, which can damage the hardware and lead to data loss or service disruption. Therefore, data centers need to monitor and control the temperature and humidity levels within the recommended ranges by using various cooling systems, airflow management, and sensors12.
References: 1 5 Factors to Consider for Data Center Environmental Monitoring(https://community.fs.com/blog/5-factors-to-consider-for-data-center-environmental-monitoring.html)2 Data Center Environmental standards and Controls DataSpan(https://dataspan.com/blog/data-center-environmental-standards/).
Which of the following operating systems is most commonly used in embedded systems?
Correct Answer:
D
Linux is the most commonly used operating system in embedded systems because it is open source, free, customizable, and supports a wide range of architectures and devices. Linux also offers many advantages for embedded development, such as real- time capabilities, modularity, security, scalability, and reliability. Linux can run on embedded systems with limited resources, such as memory, storage, or power, and can be tailored to the specific needs of the application. Linux also has a large and active community of developers and users who contribute to its improvement and
innovation. Some examples of embedded systems that use Linux are smart TVs, routers,
drones, robots, smart watches, and IoT devices
Which of the following would MOST likely be deployed to enhance physical security for a building? (Select TWO).
Correct Answer:
BE
Badge reader and motion sensor are devices that can be deployed to enhance physical security for a building. A badge reader is a device that scans and verifies an identification card or tag that grants access to authorized personnel only. A badge
reader can help prevent unauthorized entry or intrusion into a building or a restricted area. A motion sensor is a device that detects movement and triggers an alarm or an action when motion is detected. A motion sensor can help deter or alert potential intruders or trespassers in a building or an area. Multifactor authentication is a method of verifying identity using two or more factors, such as something you know, something you have or something you are. Multifactor authentication is not a device that can be deployed to enhance physical security for a building but a technique that can be used to enhance logical security for systems or services. Personal identification number is a numeric code that can be used as part of authentication or access control. Personal identification number is not a device that can be deployed to enhance physical security for a building but an example of something you know factor in multifactor authentication. Firewall is a device or software that filters network traffic based on rules and policies. Firewall is not a device that can be deployed to enhance physical security for a building but a device that can be used to enhance network security for systems or services. Soft token is an application or software that generates one-time passwords or codes for authentication purposes. Soft token is not a device that can be deployed to enhance physical security for a building but an example of something you have factor in multifactor authentication. References: CompTIA A+ Core 2 (220-1002) Certification Exam Objectives Version 4.0, Domain 3.3