Security is the most heavily weighted domain on the CompTIA A+ Core 2 exam, covering approximately 26% of all questions. You must know how to configure OS security settings, implement authentication methods, apply security best practices, detect malware, use encryption, manage user permissions, recognize social engineering attacks, and respond to security incidents. This chapter focuses on physical security, logical security controls, data protection methods, and common security threats you'll encounter in IT support roles.
Badge readers use RFID or magnetic stripe cards to control building and room access. They create audit trails showing who entered where and when.
Biometric authentication uses fingerprints, retinal scans, facial recognition, or voice patterns to verify identity. These systems have false acceptance rate (FAR) and false rejection rate (FRR) metrics that measure accuracy.
Video surveillance deters theft and provides evidence for investigations. CCTV cameras should cover entrances, server rooms, and equipment storage areas.
Door locks and access control vestibules (formerly called mantraps) prevent tailgating by requiring one person to authenticate before the next person can enter.
Cable locks secure laptops and portable equipment using Kensington lock slots. USB locks physically block USB ports to prevent data theft.
Server locks and locking cabinets protect critical hardware. Server rooms should have separate access controls from general office areas.
Equipment destruction methods:
Active Directory (AD) is Microsoft's centralized authentication and authorization system for Windows networks. AD uses domains to organize users, computers, and resources.
Login scripts run automatically when users authenticate. They map network drives, configure printers, and apply user-specific settings.
Domain policies enforce security settings across multiple computers from a central location using Group Policy Objects (GPOs).
Group Policy / Updates controls Windows configurations including password requirements, software restrictions, update schedules, and desktop lockdowns.
Organizational Units (OUs) are containers within Active Directory that organize users and computers. You apply different GPOs to different OUs.
Home folders are personal network storage locations assigned to each user, typically redirected to a file server for backup.
Folder redirection moves user profile folders (Desktop, Documents, AppData) from local drives to network locations for centralized backup and roaming access.
Security groups simplify permission management by assigning rights to groups rather than individual users. Users inherit permissions from their group memberships.
Principle of least privilege means users get only the minimum permissions needed to perform their jobs. This limits damage from compromised accounts.
Access Control List (ACL) specifies which users or groups can access a resource and what actions they can perform (read, write, execute, delete).
Mandatory Access Control (MAC) uses security labels and clearances assigned by administrators. Users cannot change permissions. Used in military and government environments.
Discretionary Access Control (DAC) allows resource owners to control who accesses their files. This is the Windows default model using NTFS permissions.
Role-Based Access Control (RBAC) assigns permissions based on job roles rather than individual users. When someone changes positions, you simply change their role membership.
Usernames and passwords are the most common authentication method. Strong passwords use length (minimum 8-12 characters), complexity (uppercase, lowercase, numbers, symbols), and expiration policies.
Multifactor authentication (MFA) requires two or more verification methods from different categories:
Single sign-on (SSO) allows users to authenticate once and access multiple applications without re-entering credentials. Reduces password fatigue but creates a single point of failure.
RADIUS (Remote Authentication Dial-In User Service) centralizes authentication for network devices, VPNs, and wireless access points. Uses UDP ports 1812 (authentication) and 1813 (accounting).
TACACS+ (Terminal Access Controller Access-Control System Plus) is Cisco's alternative to RADIUS, offering more granular command authorization and full packet encryption.
Kerberos is the authentication protocol used by Active Directory. It issues time-stamped tickets to authenticate users without repeatedly sending passwords over the network.
Screen locks require PIN, password, pattern, or biometric authentication after inactivity timeout (typically 5-15 minutes).
Remote wipe erases all data on lost or stolen devices. Can be triggered through mobile device management (MDM) software or cloud services like Find My iPhone.
Locator applications track device GPS coordinates to help recover lost equipment or trigger remote actions.
MDM (Mobile Device Management) software centrally manages corporate mobile devices, enforcing security policies, distributing apps, and tracking inventory.
Full device encryption protects data even if someone removes the storage chip. iOS devices encrypt by default when you set a passcode; Android has encryption enabled by default on modern versions.
Authenticator applications like Google Authenticator or Microsoft Authenticator generate time-based one-time passwords (TOTP) for MFA without requiring SMS.
Trusted Platform Module (TPM) is a chip on the motherboard that stores encryption keys and provides hardware-based security. Required for BitLocker and measured boot.
BitLocker is Windows full-disk encryption that requires TPM 1.2 or higher (or can use USB key on systems without TPM). Available on Windows Pro, Enterprise, and Education editions only.
BitLocker To Go encrypts removable drives like USB flash drives and external hard drives.
FileVault is macOS full-disk encryption using XTS-AES-128 with a 256-bit key. Recovery keys are stored in iCloud or provided during setup.
EFS (Encrypting File System) is Windows file-level encryption integrated with NTFS. It encrypts individual files and folders rather than entire drives. Uses user certificates, so losing the user profile means losing access unless recovery agent is configured.
WEP (Wired Equivalent Privacy) is obsolete and easily cracked within minutes. Never use WEP on any network.
WPA (Wi-Fi Protected Access) improved on WEP but is also deprecated. Uses TKIP encryption which has known vulnerabilities.
WPA2 uses AES encryption and is the minimum acceptable standard for wireless networks. Supports personal mode (PSK with shared password) and enterprise mode (802.1X with RADIUS authentication).
WPA3 is the newest standard, adding simultaneous authentication of equals (SAE) to protect against offline dictionary attacks and providing forward secrecy.
Disabling SSID broadcast hides network name from casual users but doesn't provide real security since the SSID is still transmitted in probe requests.
MAC filtering only allows pre-approved device addresses to connect. Provides minimal security since MAC addresses are easily spoofed.
Antenna placement and power levels should minimize signal outside the building to reduce unauthorized access opportunities.
Viruses attach to executable files and spread when users run infected programs. Require user action to propagate.
Worms self-replicate across networks without user interaction. They exploit vulnerabilities to spread automatically.
Trojans disguise themselves as legitimate software while performing malicious actions. They don't self-replicate.
Ransomware encrypts user files and demands payment for the decryption key. Modern variants also threaten to publish stolen data.
Spyware monitors user activity and sends information to attackers. Includes keyloggers that record keystrokes to steal passwords.
Rootkits hide deep in the operating system (kernel level) and conceal their presence from antivirus software. Often require clean OS reinstall to remove.
Adware displays unwanted advertisements, often bundled with free software. Less malicious than other types but degrades performance.
Cryptominers use system resources to mine cryptocurrency without permission, causing high CPU usage and heat.
Botnet is a network of compromised computers controlled remotely to launch DDoS attacks, send spam, or spread malware.
Phishing uses fake emails pretending to be from legitimate sources to steal credentials or install malware. Look for spelling errors, generic greetings, suspicious links, and urgent threats.
Spear phishing targets specific individuals using personalized information to appear more convincing.
Whaling targets high-level executives (the "big fish") with sophisticated attacks.
Vishing (voice phishing) uses phone calls to trick victims into revealing sensitive information or making fraudulent transfers.
Smishing (SMS phishing) sends text messages with malicious links or requests for personal information.
Shoulder surfing involves watching someone enter passwords or view sensitive information on their screen.
Tailgating follows authorized personnel through secure doors without proper authentication.
Impersonation pretends to be someone with authority (IT support, manager, vendor) to gain access or information.
Dumpster diving searches trash for discarded documents containing passwords, account numbers, or confidential information.
Evil twin sets up rogue wireless access points with legitimate-looking names to intercept traffic from unsuspecting users.
Patch management keeps operating systems and applications updated to fix security vulnerabilities. Enable automatic updates for workstations; test patches on development systems before deploying to production servers.
Acceptable Use Policy (AUP) defines how employees can use company IT resources, including internet access, email, and equipment. Violations can result in disciplinary action.
Data classification labels information by sensitivity level (public, internal, confidential, secret) to determine appropriate handling and access controls.
Compliance requirements like HIPAA (healthcare), PCI DSS (credit cards), and GDPR (EU privacy) mandate specific security controls and data handling procedures.
Incident response procedures define how to detect, report, contain, eradicate, and recover from security incidents. Document everything for post-incident analysis.
Change management requires approval, documentation, and rollback plans before modifying production systems. Prevents unauthorized changes that could create vulnerabilities.
Asset management and inventory tracks all hardware and software to identify outdated systems needing replacement and detect unauthorized devices.
Firewalls filter network traffic based on rules. Host-based firewalls run on individual computers (Windows Defender Firewall); network firewalls protect entire network segments.
Port security involves closing unused ports and restricting which ports applications can use. Common ports to know:
VPN (Virtual Private Network) creates encrypted tunnels over public networks for secure remote access. Common protocols include IPsec, L2TP, and SSL/TLS.
Email security includes spam filters, attachment scanning, SPF/DKIM/DMARC authentication, and user training to recognize phishing.
DNS filtering blocks access to known malicious domains, preventing malware downloads and phishing sites.
User Account Control (UAC) prompts for administrator credentials when programs try to make system changes. Prevents malware from silently gaining elevated privileges.
Windows Defender Antivirus is built into Windows 10/11 and provides real-time protection, scheduled scans, and automatic definition updates.
Windows Defender Firewall has separate profiles for domain, private, and public networks. Configure inbound and outbound rules to control traffic.
NTFS permissions control file and folder access. Key permissions include:
Share permissions apply when accessing files over the network. NTFS and share permissions combine with the most restrictive taking effect.
Permission inheritance means child folders automatically receive parent folder permissions unless explicitly blocked.
Run as administrator right-click option executes programs with elevated privileges on standard user accounts.
chmod changes file permissions in Linux/macOS using numeric (755) or symbolic (rwxr-xr-x) notation. Read=4, Write=2, Execute=1.
sudo executes commands with root privileges. Requires user to be in sudoers file and authenticate with their own password.
Gatekeeper (macOS) prevents unsigned applications from running unless you explicitly approve them in System Preferences.
XProtect (macOS) is Apple's built-in antivirus that automatically scans downloads and updates malware definitions.
1. Symptom: User receives constant browser pop-ups advertising software even with pop-up blocker enabled. Browser homepage changed to unfamiliar search engine. New toolbars appeared that user didn't install.
Likely Cause: Adware infection from bundled software installation or malicious browser extension.
Fix: Boot to Safe Mode with networking. Uninstall suspicious programs from Control Panel. Reset browser settings to default. Run full antivirus scan with updated definitions. Remove malicious extensions from browser. Clear browser cache and cookies. Install reputable ad blocker extension.
2. Symptom: Windows displays "Access Denied" error when user tries to open folder on shared network drive. Same user could access this folder yesterday. Other users can still access the folder normally.
Likely Cause: User's group membership changed or NTFS permissions were modified removing their access rights.
Fix: Check user's Active Directory group memberships to verify they're still in the appropriate security group. Right-click the folder, select Properties, Security tab, verify user or their group has at least Read permissions. If using share permissions, check both share and NTFS permissions apply correctly. Re-add user to appropriate group or explicitly grant NTFS permissions if needed.
3. Symptom: All files on user's desktop and Documents folder now have .encrypted extension and cannot be opened. Text file appeared named "READ_ME_NOW.txt" demanding Bitcoin payment. User clicked email attachment earlier today.
Likely Cause: Ransomware infection from malicious email attachment.
Fix: Immediately disconnect computer from network to prevent spreading to network shares. Do NOT pay ransom. Identify ransomware variant using ID Ransomware website. Check if free decryption tools exist from No More Ransom project. If no decryption available, wipe system completely and reinstall Windows from scratch. Restore user files from clean backup created before infection date. If no clean backups exist, data may be permanently lost. Update antivirus and train user on email attachment dangers.
Task: Configure BitLocker Drive Encryption on Windows 10/11 Pro
Q1: A user reports their computer is running extremely slowly and the CPU fan is constantly loud. Task Manager shows 98% CPU usage by an unknown process called "miner.exe" that restarts even after being ended. What type of malware is MOST likely present?
(a) Ransomware
(b) Trojan
(c) Cryptominer
(d) Rootkit
Ans: (c)
Cryptominers use system CPU/GPU resources to mine cryptocurrency, causing high resource usage, heat, and performance degradation with persistent processes that restart automatically.
Q2: Which of the following authentication methods provide multifactor authentication? (Select TWO)
(a) Username and password
(b) Fingerprint scan and smart card
(c) Password and security question
(d) PIN and authenticator app code
(e) Two different passwords
Ans: (b) and (d)
Multifactor authentication requires factors from different categories; fingerprint (something you are) plus smart card (something you have) and PIN (something you know) plus authenticator app (something you have) both qualify, while multiple passwords or security questions are single-factor.
Q3: A technician needs to prevent users from installing unauthorized software while still allowing them to run approved applications and access their documents. Which Windows security feature should be configured?
(a) Windows Defender Firewall
(b) BitLocker encryption
(c) User Account Control
(d) Group Policy Software Restriction Policies
Ans: (d)
Group Policy Software Restriction Policies or AppLocker can whitelist approved applications and block all others, preventing unauthorized software installation while allowing normal application usage.
Q4: You are configuring NTFS permissions for a shared folder. The Marketing group needs to create and edit files but not delete them. The Managers group needs full access including deletion. Which permissions should you assign?
(a) Marketing: Read; Managers: Modify
(b) Marketing: Write; Managers: Full Control
(c) Marketing: Modify; Managers: Full Control
(d) Marketing: Read & Execute; Managers: Modify
Ans: (b)
Write permission allows creating files but not deleting them, while Full Control provides all permissions including deletion; however, the better answer is (c) because Modify includes write and delete of own files, though the question specifically states no deletion capability which makes Write technically more accurate despite being unusual in practice.
Ans: (c)
Marketing needs Modify to create and edit files, and Managers need Full Control for complete access including deletion and permission changes.
Q5: An employee receives an email appearing to be from the IT department requesting they click a link to verify their account credentials within 24 hours or access will be suspended. The link goes to a site that looks like the company portal but has a slightly different URL. What type of attack is this?
(a) Vishing
(b) Smishing
(c) Phishing
(d) Shoulder surfing
Ans: (c)
Phishing uses fraudulent emails with fake links to steal credentials by impersonating legitimate organizations and creating urgency to bypass critical thinking.
Q6: Performance-based task: You need to configure Windows Defender Firewall to block all incoming Remote Desktop connections on a Windows 10 computer.
Expected steps:
Q7: Which of the following is the BEST practice for protecting sensitive data on mobile devices used by employees who frequently work in public locations?
(a) Disable SSID broadcast on company Wi-Fi
(b) Enable full device encryption and require strong authentication
(c) Install antivirus software on the devices
(d) Configure MAC address filtering on network equipment
Ans: (b)
Full device encryption protects data if the device is lost or stolen, and strong authentication prevents unauthorized access, addressing the primary mobile security risks for devices used in public.