Categories
220-1002 Dumps

220-1002 Real Exam Dumps Questions and answers 131-140

Get Full Version of the Exam
http://www.EnsurePass.com/220-1002.html

Question No.131

A technician is contacted by a user who is working from home but is unable to connect to any office resources (e.g., files, printers). The user is able to access the Internet. Which of the following should the technician check FIRST?

  1. VPN

  2. DHCP

  3. NAT

  4. DNS

Correct Answer: A

Question No.132

Joe, an end user, has been prompted to provide his username and password to access the payroll system. Which of the following authentication methods is being requested?

  1. Single-factor

  2. Multifactor

  3. RADIUS

  4. TACACS

Correct Answer: A

Question No.133

A technician is working on a Windows 10 PC that is running slowly. Which of the following commands should the technician use to correct this issue? (Select two.)

  1. dir

  2. chdsk

  3. dism

  4. ipconfig

  5. format

  6. diskpart

Correct Answer: BC

Question No.134

A network administrator needs to be able to securely connect to a local router from within the office. Which of the following protocols should the administrator ensure is enabled on the router?

  1. RDP

  2. SSH

  3. TFTP

  4. HTTP

Correct Answer: B

Question No.135

A user receives an email on a company smartphone. When trying to open the email, the user gets a message stating the email is encrypted, and the user cannot open it. The user forwards the email to a personal email account and receives the same message. The user calls the IT department to ask for help. To decrypt the message, the technician tells the user to contact the sender of the message to be able to exchange:

  1. keys

  2. passwords

  3. root CA

  4. tokens

Correct Answer: A

Question No.136

An office manager emails a technical support contractor about a new desktop for one of the workers. The office manager provides a specific configuration for the desktop. The technician notes the request will require the purchase of a new system. New system purchases are not in the scope of the support agreement. Which of the following should the technician do NEXT?

  1. Create a risk analysis report for review

  2. Submit a change order for approval

  3. Insist the worker accepts the standard desktop

  4. Document the request and place the order

Correct Answer: B

Question No.137

Joe, a customer, calls a technician to report a remote computer is demonstrate erratic behavior while he is working on it. The technician verifies the files and directories Joe is working on locally cannot be open in any application, and the computer is extremely slow. Which of the following is the MOST likely cause of this issue?

  1. Files disappearing

  2. File permission changes

  3. Application crash

  4. Too many start items

Correct Answer: A

Question No.138

A technician is called to troubleshoot a user#39;s Windows workstation that fails to boot. The user reports that, after updating the workstation#39;s graphics driver to a beta version, the machine gives a quot;Stopquot; error on every boot Which of the following should the technician complete to resolve the issue?

  1. Boot the workstation in safe mode and disable the graphics driver system tray menu

  2. Boot the workstation in safe mode with networking and install the latest stable graphics driver.

  3. Boot the workstation in safe mode and disable Windows driver signing requirements

  4. Boot the workstation in safe mode with Command Prompt and enable Driver Verifier with standard settings

Correct Answer: A

Question No.139

A SOHO technician needs to upgrade two computers quickly and is not concerned about retaining user settings. The users currently have Windows 8 and want to upgrade to Windows 10. Which of the following installation methods would the technician MOST likely use to accomplish this quickly?

  1. Unattended installation

  2. Remote network installation

  3. In-place upgrade

  4. Clean installation

Correct Answer: A

Question No.140

A technician is disposing of computer hardware that contains PHI. The drive must be reusable. Which of the following methods should be used?

  1. Degauss

  2. Drive wipe

  3. Standard format

  4. Low-level format

Correct Answer: B

Get Full Version of 220-1002 Dumps

Categories
220-1002 Dumps

220-1002 Real Exam Dumps Questions and answers 91-100

Get Full Version of the Exam
http://www.EnsurePass.com/220-1002.html

Question No.91

A user#39;s mobile device is losing its battery change very quickly. The user report charge at 9:00

a.m. but has 22% battery by 1:00 p.m. The user has installed several applications, and the phone is relatively new , high-end phon. The user claims most of the usage involves checking emails for a few minutes three or four times per hours. Windows of the following should a technician perform FIRST to diagnose the issue properly?

  1. Check the application and their resources usage.

  2. Order a replacement battery and see if the phone maintain its charge.

  3. Configure the email software to work on a fetch schedule instead of the push setting

  4. Wipe the phone screen brightness to 30%.

  5. Uninstall all the applications on the phone and see if the battery issues remain.

Correct Answer: A

Question No.92

A company#39;s security policy does not allow USB drives to be available in workstations. However, an exception needs to be made for a user. The network administrator changes the policy for the user. Which of the following commands should the administrator run on the user#39;s workstation?

  1. chkdsk

  2. netstat

  3. gpupdate

  4. diskpart

Correct Answer: C

Question No.93

A technician receives a phone call regarding ransomware that has been detected on a PC in a remote office. Which of the following steps should the technician take FIRST?

  1. Disconnect the PC from the network

  2. Perform an antivirus scan

  3. Run a backup and restore

  4. Educate the end user

Correct Answer: A

Question No.94

During the firmware upgrade of a web server, a power outage occurred. The outage caused a failure within the upgrade. Which of the following plans must be implemented to revert back to the most recent version of the firmware?

  1. Backout plan

  2. Contingency plan

  3. Alternative plan

  4. Backup plan

Correct Answer: D

Question No.95

A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately. With which of the following types of infections are the PCs MOST likely infected? (Select two.)

  1. Spyware

  2. Zombies

  3. Virus

  4. Ransomware

  5. Worm

  6. Botnet

Correct Answer: BE

Question No.96

A junior Linux system administrator needs to update system software. Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software?

  1. sudo

  2. chmod

  3. grep

  4. pwd

Correct Answer: A

Question No.97

A user is trying to install a very large .dmg file on a Windows computer but is receiving an error message. Which of the following is causing the error?

  1. Small hard drive

  2. Insufficient RAM

  3. OS compatibility

  4. Folder permissions

Correct Answer: C

Question No.98

A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources. Which of the following protocols and authentication methods should the technician implement? (Select two.)

  1. WPA

  2. WPA2

  3. WEP

  4. TKIP

  5. RADIUS

  6. Multifactor

  7. TACACS

  8. SSO

Correct Answer: BF

Question No.99

A customer purchased a 3TB HDD to use with a Windows 7 PC and wants to have letter quot;Jquot; assigned only to the drive. Which of the following types of partitioning should be performed to give the customer full use of the 3 TB drive?

  1. GPT

  2. Dynamic

  3. Basic

  4. Extended

Correct Answer: A

Question No.100

A user reports malware activity on an isolated workstation used for testing It is running an end-of- life OS. and a USB drive is the only method used to transfer files After removing the malware and replacing the USB drive with a brand new one. the technician gives the approval to use the equipment. The next day the user reports the same malware activity is present after powering on the system Which of the following did the technician forget to do to prevent reinfection?

  1. Connect to the network and update the OS with the latest security patches

  2. Scan and dean the USB device used to transfer data from the equipment

  3. Disable System Restore and remove all restore points from the system

  4. Update the local antivirus and set it to scan automatically every evening

Correct Answer: D

Get Full Version of 220-1002 Dumps

Categories
220-1002 Dumps

220-1002 Real Exam Dumps Questions and answers 101-110

Get Full Version of the Exam
http://www.EnsurePass.com/220-1002.html

Question No.101

Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows?

  1. 2GB

  2. 4GB

  3. 8GB

  4. 16GB

Correct Answer: B

Question No.102

Joe. a customer, requests to have a technician rename his laptop to the name of his favorite sports team. Which of the following documents MUST the technician consider before performing this action?

  1. Acceptable use policy

  2. Inventory management

  3. EULA

  4. MDM policy

Correct Answer: B

Question No.103

An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is running slowly, even while not browsing the internet. Which of the following actions should the user take?

  1. Update antivirus definitions

  2. Install anti-malware software

  3. Enable the pop-up blocker

  4. Reboot the PC

Correct Answer: B

Question No.104

Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC?

  1. Put on an ESD strap.

  2. Place components on an ESD mat

  3. Disconnect the power before servicing the PC

  4. Place the PC on a grounded work bench

Correct Answer: C

Question No.105

A technician is cleaning up a warehouse and several old CRT monitors and UPS units. The technician removes the batteries from the UPSs and wants to comply with proper disposal techniques. Which of the following should the technician do NEXT to proceed with disposal of the batteries?

  1. Place security In trash receptacles

  2. Refer to the manufacture#39;s specific usage

  3. Review the material safety data sheet

  4. Conduct an Internal search of disposal techniques

Correct Answer: B

Question No.106

A user reports that when opening a web browser the initial page loads to a search engine the user does not recognize When the user performs searches on the site, the results are often irrelevant, and there are many pop-ups Which of the following should a technician do to resolve these issues? (Select TWO)

  1. Reset the user#39;s browser to default settings

  2. Delete the user#39;s cached images, temporary files, and cookies

  3. Reboot the user#39;s computer and install a secondary antivirus

  4. Convince the user to use a different web browser that is currently unaffected

  5. Download the update to the user#39;s web browser of choice

  6. Remove any unapproved applications from the user#39;s startup items

Correct Answer: AF

Question No.107

A technician must remove data from the human resources computers. The technician plans to reuse the drives in the computers. Which of the following data destruction methods should the technician perform to ensure the data is removed completely?

  1. Degaussing

  2. Standard format

  3. Overwrite

  4. Low-level format

Correct Answer: D

Question No.108

A company brings in contractors several times a year to perform inventory, and the contractors use company supplied laptops. The company#39;s security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory. Which of the following BEST enforces this policy?

  1. Delete the user accounts

  2. Disable the user accounts

  3. Restrict the user accounts

  4. Reset the user accounts

Correct Answer: A

Question No.109

Joe, a technician, has his daily plans forwarded to him by his supervisor. Upon arrival to the external to the second support call of the day, Joe realizes the issue will require much more time than initially scheduled, and several support calls will not be completed. Which of the following would be the appropriate action for Joe?

  1. Contact his supervisor so the supervisor can make schedule changes.

  2. Move the appoints to the next business day.

  3. Reach out to a colleague to assist in completing the jobs.

  4. Continue to work on the current call, and get to the others as soon as possible.

Correct Answer: A

Question No.110

A user contacts a technician to troubleshoot server errors. The user explains that some files will not open on the server, the data backups are operational, and the weather has been bad. The technician notices missing time slots in the event log. Which of the following should the technician replace to prevent these issues in the future?

  1. System memory

  2. Surge protector

  3. Hard drives

  4. Battery backup

Correct Answer: D

Get Full Version of 220-1002 Dumps

Categories
220-1002 Dumps

220-1002 Real Exam Dumps Questions and answers 111-120

Get Full Version of the Exam
http://www.EnsurePass.com/220-1002.html

Question No.111

A technician accessed a network share from a computer joined to workgroup. The technician logged in as quot;user1quot; and directed the computer to save the username and password. Several weeks later, the technician wants to log in to this network share using the administrator account. The computer does not prompt for a username and password, but it automatically logs in to the network share under the quot;user1quot; account. Which of the following would allow the technician to log in using the quot;administratorquot; username?

  1. Use the command: net use Z: \\fileserver\share

  2. Go to the Sync Center and disable the offline files feature.

  3. Delete the quot;userquot; account for the network share in Credential Manager.

  4. Join the computer and file server to a domain and delegate administrator rights to quot;user1quot;.

  5. Use the Advanced Sharing options in the Network and Sharing Center and enable quot;turn on network discoveryquot;.

Correct Answer: A

Question No.112

A user calls a technician regarding an iOS mobile device that is having problems with standby time after a new update was applied. The technician verifies no new applications were installed since the update, but the device still has poor standby time even after the update is removed. Which of the following is the MOST likely cause of the issue?

  1. Zero-day malware

  2. Safari code injection

  3. OS corruption

  4. Overheating

  5. Time sync failure

Correct Answer: D

Question No.113

A user#39;s smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures. Which of the following steps should be taken FIRST to determine the cause of the issue?

  1. Uninstall the camera application

  2. Check the application permissions

  3. Reset the phone to factory settings

  4. Update all of the applications on the phone

  5. Run any pending OS updates

Correct Answer: B

Question No.114

A technician repaired a laptop for a customer. The customer then complained the repair took too

long and questioned the steps the technician took to fix the problem. Which of the following should the technician do NEXT?

  1. Provide documentation of the repair to the customer

  2. Allow the customer to voice concerns and post the story to social media later

  3. Inform the customer the job is done and return to the office

  4. Defend each step and why it was necessary

Correct Answer: A

Question No.115

A user calls a technician to report issues when logging in to a vendor#39;s website. The technician is able to log in successfully before going to the office. However, the technician is unable to log in when in the user#39;s office. The user also informs the technician of strange pop-up notifications.

Which of the following are the MOST likely causes of these issues? (Select TWO).

  1. System files have been deleted

  2. Proxy settings are configured improperly

  3. The OS has been updated recently.

  4. There are disabled services on the vendor website.

  5. Program file permissions have changed recently.

  6. There is a rogue anti-malware program.

Correct Answer: DF

Question No.116

Users notify the help desk of an email that was just received. The email came from the help desk#39;s email address and asked the users to click on an embedded link. This email is BEST described as:

  1. phishing.

  2. zombie.

  3. whaling.

  4. spoofing.

Correct Answer: D

Question No.117

Which of the following should be enacted to reduce a company#39;s liability and exposure to a potential lawsuit?

  1. Acceptable use policy

  2. Incident documentation policy

  3. Password compliance policy

  4. Change control policy

Correct Answer: A

Question No.118

Joe. a technician, receives notification that a share for production data files on the network Is encrypted. Joe suspects a crypto virus Is active. He checks the rights of the network share to see which departments have access. He then searches the user directories of those departmental

users who are looking for encrypted files. He narrows his search to a single user#39;s computer. Once the suspected source of the virus is discovered and removed from the network, which of the following should Joe do NEXT?

  1. Educate the end user on safe browsing and email habits.

  2. Scan and remove the malware from the infected system.

  3. Create a system restore point and reboot the system.

  4. Schedule antivirus scans and perform Windows updates.

Correct Answer: B

Question No.119

A user is working on a shared computer and attempts to open the email application, which freezes when opened. A technician logs into the computer, and the email application works without issue. The technician has the user log back in, but the application still freezes when opened. Which of the following is the NEXT step the technician should take to resolve the issue?

  1. Check for and apply software updates

  2. Perform repair installation on the application

  3. Add the user to the local administrators group

  4. Rebuild the user#39;s mail profile

Correct Answer: D

Question No.120

A technician arrives on site to find that two users who have the same model on Android smartphone are having the same issue with a specific application. Whenever they attempt to launch the application, it fails and gives an error message. Which of the following should the technician do FIRST?

  1. Reinstall the application

  2. Roll back the application to the earlier version

  3. Clear the application cache

  4. Update the OS of the smartphones

Correct Answer: D

Get Full Version of 220-1002 Dumps

Categories
220-1002 Dumps

220-1002 Real Exam Dumps Questions and answers 121-130

Get Full Version of the Exam
http://www.EnsurePass.com/220-1002.html

Question No.121

Which of the following BEST describes the purpose of an ESD mat?

  1. Protects against accidental static discharge

  2. Protects against dust/dirt contamination

  3. Protects against accidental scratches

  4. Protects against accidental water damage

Correct Answer: A

Question No.122

A technician is installing Windows 7 64-bit OS on a VM but keeps getting errors. The specifications for the malware are:

image

Two 1GHz CPUs

image

image

2GB of memory 15GB hard drive

image

800×600 screen resolution

Which of the following should the technician do to resolve the problem?

  1. Increase the number of CPUs

  2. Increase the amount of memory

  3. Increase the amount of hard drive space

  4. Increase the screen resolution

Correct Answer: C

Question No.123

A user#39;s computer reports it has many virus infections and directs the user to call a phone number for assistance. A technician removes the hard drive and virus scans the drive with another computer. The scan does not identify any viruses Which of the following is MOST likely the problem?

  1. Rootkit

  2. Zero-day malware

  3. Rogue antivirus

  4. Old virus definitions

Correct Answer: D

Question No.124

A technician is working on a virtual server migration project. The technician has already completed the SOW; however, the servers will not work without a critical network configuration that was missed in the original SOW. The technician needs to make the adjustments quickly. Which of the following best practice processes should the technician perform NEXT?

  1. Obtain end-user acceptance for the proposed changes and submit a change plan for additional work.

  2. Submit the changes to the change board for approval.

  3. Notify the change team of the changes needed and perform the changes.

  4. Escalate to stakeholders and obtain override approval for out-of-scope changes.

  5. Document the changes and perform the work.

Correct Answer: E

Question No.125

A network administrator recently learned users have been accessing websites that are restricted based on content by the firewall. To prevent users from circumventing the firewall rules, which of the following Windows settings should the administrator locks to prevent them from being changed?

  1. Default gateway

  2. Proxy server

  3. WINS server

  4. DHCP settings

Correct Answer: B

Question No.126

Which of the following installation methods will allow a technician to resolve issues that may arise while the installation is being performed?

  1. Unattended installation

  2. Remote installation

  3. Repair installation

  4. Image deployment installation

Correct Answer: D

Question No.127

Which of the following operating systems utilizes the web browser named Edge, replacing its older browser software?

  1. Windows 7

  2. Windows 8

  3. Windows 8.1

  4. Windows 10

Correct Answer: D

Question No.128

While attempting to install a new program, an end user is notified the workstation meets the memory requirements, but it does not meet the requirements for free space. Due to time constraints the user needs a quick way to install and access the program. Which of the following is the BEST option given the solution?

  1. Install to a network drive

  2. Install to a USB drive

  3. Install to a DVD-RW

  4. Install to a security internal_HDD

Correct Answer: A

Question No.129

Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time because he has already tried everything that has been suggested. Which of the following should the technician do?

  1. Since Joe is concerned about time, suggest calling back later when Joe has more time to troubleshoot

  2. Record the call and send it to the local intranet for future technicians to learn how to deal with calls like this one

  3. Ask more open-ended questions to see if the issue can be narrowed down in order to properly identify the issue and save time

  4. Inform the customer that there is a troubleshooting script that must be followed to get the issue resolved

Correct Answer: C

Question No.130

A SOHO user calls a technician and wants to secure a home network. The SOHO user needs to have protection from physical connections and ensure that employees cannot access applications or personal emails. Which of the following would the technician MOST likely configure on the new network device to accommodate this SOHO user#39;s request? (Select TWO).

  1. MAC filtering

  2. Default SSID

  3. Radio power levels

  4. Content filtering

  5. Physical security

Correct Answer: DE

Get Full Version of 220-1002 Dumps

Categories
220-1002 Dumps

220-1002 Real Exam Dumps Questions and answers 61-70

Get Full Version of the Exam
http://www.EnsurePass.com/220-1002.html

Question No.61

A corporate network was recently infected by a malicious application on a flash drive that downloaded sensitive company files and injected a virus, which spread onto the network Which of the following best practices could have prevented the attack?

  1. Implementing strong passwords

  2. Changing default credentials

  3. Disabling AutoRun

  4. Removing Guest account

  5. Encrypting data

Correct Answer: D

Question No.62

A user who is running Windows 10 logs Into a machine and notices that shared drives are missing, the quot;My Documents* folder is empty, and personal settings are reset. Which of the following would be required to resolve the issue?

  1. Remove the registry entry and rename the local account folder.

  2. Delete or rename the local user folder.

  3. Run DISM and re-add the local power user account.

  4. Remove the user account In Credential Manager and restart the PC.

Correct Answer: D

Question No.63

A SOHO user calls a technician and wants to secure a home network. The SOHO user needs to have protection from physical connection and ensure that employees cannot applications or personal emails. Which of the following would the technician MOST likely configure on the network device to accommodate the SOHO user#39;s request? (Select TWO)

  1. MAC filtering

  2. Default SSID

  3. Ratio power levels

  4. Content filtering

  5. Physical security

Correct Answer: BE

Question No.64

Ann, a user, calls the help desk regarding an issue on her laptop. While working remotely, she appears to be connecting to WiFi but is unable to retrieve her corporate email. The wireless name is listed as quot;ConnectMequot; and appears as unsecure. Which of the following should the help desk perform to fix the issue?

  1. Remote into Ann#39;s system and restart the wireless adapter

  2. Ask Ann to open a browser and watch for a redirect page

  3. Advice Ann to pug an Ethernet cable into her laptop

  4. Direct Ann to run an antivirus program on her laptop

Correct Answer: B

Question No.65

A systems administrator needs to add security to the server room. Which of the following would provide the BEST security for the room? (Choose two.)

  1. Universal serial bus locks

  2. Personal identity verification cards

  3. Privacy screen

  4. Entry control roster

  5. Door locks

  6. Privacy window

Correct Answer: EF

Question No.66

A SOHO customer has recently experienced a major hurricane. The customer has no backups and has lost all data and hardware associated with the company. The customer calls a contractor to assist in the rebuilding process and needs suggestions on the best way to prevent this from happening again. Which of the following recommendations should the contractor give to the customer? (Select two.)

  1. Backup testing

  2. Cloud storage

  3. Local storage backups

  4. Data recovery

  5. Hot site

  6. Waterproof devices

Correct Answer: BE

Question No.67

A small office#39;s wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network. Which of the following configurations MOST likely allowed the attack to take place? (Select two.)

  1. Guest network

  2. TKIP

  3. Default login

  4. Outdated firmware

  5. WPS

  6. WEP

Correct Answer: CF

Question No.68

Joe, a user who is travelling for business, reports that his mobile phone was getting approximately 35 Mbps for the first few days of his trip, but now it is only getting around 500 Kbps. Joe uses the device as a GPS to visit customers and as a hotspot to check work email and watch movies online. Which of the following is the MOST likely cause of Joe#39;s slow data speeds?

  1. Joe#39;s data transmission is over the limit

  2. The phone needs to be rebooted from overuse

  3. The use of GPS interferes with data speeds

  4. There is unintended Bluetooth pairing

Correct Answer: A

Question No.69

Joe, a customer, calls a technician to report a remote computer is demonstrating erratic behavior while he is working on it. The technician verifies the files and directories. Joe is working on locally cannot be opened in any application, and the computer is running extremely slow. Which of the following is the MOST likely cause of this issue?

  1. Files disappearing

  2. File permission changes

  3. Application crash

  4. Too many startup items

Correct Answer: D

Question No.70

Which of the following would a technician use to store memory chips from a laptop safely after an upgrade?

  1. Mylar bags

  2. Cardboard boxes

  3. Antistatic containers

  4. Paper envelopes

Correct Answer: C

Get Full Version of 220-1002 Dumps

Categories
220-1002 Dumps

220-1002 Real Exam Dumps Questions and answers 71-80

Get Full Version of the Exam
http://www.EnsurePass.com/220-1002.html

Question No.71

A security administrator does some network testing and identifies significant issues with security on desktop computers. As part of remediation, the network administrator is developing documentation based on best practices for applying updates to end users#39; computers. The network administrator must create the process documentation needed to submit back to the security administrator for approval. Which of the following process documents would the network administrator MOST likely create? (Choose two.)

  1. Risk analysis

  2. End-user acceptance

  3. Backout plan

  4. Plan for change

  5. Business processes

  6. Request for proposal

Correct Answer: CD

Question No.72

Which of the following technologies can be utilized in a wireless network environment to provide secure SSO access for WiFi and network resources?

  1. WPA2

  2. AES

  3. MAC filtering

  4. RADIUS

  5. WPS

Correct Answer: D

Question No.73

A new business will be using credit cards in a physical location as well as its web presence. Which of the following does the business need?

  1. PHI certification

  2. PCI compliance

  3. POTS implementation

  4. PII filtering

Correct Answer: B

Question No.74

A customer#39;s computer is powered on and working, but the customer is unable to get to any wired

network resources, shared drives, printers, or the Internet. Which of the following command-line tools should be used to troubleshoot this scenario?

  1. Ping

  2. Iwconfig

  3. Nbtstat

  4. Nslookup

Correct Answer: A

Question No.75

Which of the following provide the MOST security for PCs and mobile devices? (Choose two.)

  1. Access control lists

  2. Multifactor authentication

  3. Organizational unit

  4. Trusted software sources

  5. Data loss prevention

  6. Pre-shared key

Correct Answer: BD

Question No.76

Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer#39;s design? (Select two.)

  1. UPS

  2. Server rack

  3. PoE phone

  4. Desktop printer

  5. Modem

  6. Patch panel

Correct Answer: AB

Question No.77

A customer is presuming manager to get things done on time. Which of the following has the project failed to do this case?

  1. Follow up with the customer after project completion

  2. Mention a positive attitude during the project

  3. Disclose project expenses on social media

  4. Communicate with the customer clearly

Correct Answer: D

Question No.78

Ann, an end user, is working with highly regulated data and often notices the high volume of traffic in her work area. Ann requests help with limiting the exposure of data as people walk by. Which of the following security measures should be used?

  1. Biometric device

  2. Common access card

  3. Cable lock

  4. Privacy screen

  5. Mantrap

Correct Answer: D

Question No.79

A network administrator has given a technician documentation detailing the switchports the technician will need to patch in for a network upgrade. Which of the following documents did the network administrator MOST likely give to the technician?

  1. Process diagram

  2. Physical network diagram

  3. Fiber backbone diagram

  4. Logical topology diagram

Correct Answer: B

Question No.80

A team needs to deploy a temporary server room at a site to provide support during construction. Which of the following should they use at this site while setting up the server room?

  1. Air filters

  2. Privacy screens

  3. Vacuums

  4. ESD mats

Correct Answer: A

Get Full Version of 220-1002 Dumps

Categories
220-1002 Dumps

220-1002 Real Exam Dumps Questions and answers 81-90

Get Full Version of the Exam
http://www.EnsurePass.com/220-1002.html

Question No.81

A MAC user#39;s operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC. Which of the following built-in utilities should be used?

  1. Time Machine

  2. Snapshot

  3. System Restore

  4. Boot Camp

Correct Answer: A

Question No.82

A technician is investigating the cause of a Windows 7 PC running very slow. While reviewing Task Manager, the technician finds one process is using more than 90% of the CPU. Outbound network traffic on port 25 Is very high, while Inbound network traffic Is low. Which of the following tasks should be done FIRST?

  1. Disconnect the network cable.

  2. Update the antivirus software.

  3. Run an antivirus scan.

  4. Shut down the PC

Correct Answer: A

Question No.83

After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked with limiting removable hard drive access to certain network users. USB ports are used for many devices, including scanners, printers, and signature pads, so a policy is created to deny access to removable hard drives only. When testing the policy, a removable drive is plugged in but can still be accessed. Which of the following command-line tools should the technician use to apply the new policy?

  1. grupdate

  2. diskpart

  3. gpresult

  4. net use

Correct Answer: A

Question No.84

A technician is installing a private PC in a public workspace. Which of the following password practices should the technician implement on the PC to secure network access?

  1. Remove the guest account from the administrators group

  2. Disable single sign-on

  3. Issue a default strong password for all users

  4. Require authentication on wake-up

Correct Answer: D

Question No.85

Joe, a user, reports that several of his colleagues have received a suspicious email from his account that he did not send. A technician asks one of the colleagues to forward the email for inspection. After ruling out spoofing, the technician verifies the email originated from the corporate email server. Which of the following is the FIRST step the technician should take to correct this issue?

  1. See if Joe#39;s email address has been blacklisted

  2. Change the password on Joe#39;s email account

  3. Update the antivirus and perform a full scan on the PC

  4. Isolate Joe#39;s computer from the network

Correct Answer: D

Question No.86

A technician is PXE booting a computer. Which of the following is the technician MOST likely performing on the computer?

  1. Image deployment

  2. Multiboot configuration

  3. In-place upgrade

  4. System repair

Correct Answer: A

Question No.87

A technician responds to a report that a user#39;s desktop is operating much slower after upgrading the Windows OS to the latest version. The technician notices responsiveness is erratic, and the symptoms are similar to a failing hard drive. The technician runs a full hardware diagnostic, and all systems pass. The technician checks the properties for each device in Device Manager and the hard disk and the standard AHCI 1.0 serial ATA controller both indicate the following message: This device is working properly. Which of the following should the technician attempt that will MOST likely resolve the performance issue?

  1. Roll back the OS upgrade. Continue using the older version of Windows

  2. Reset the PC to its factory conditions. Perform the OS upgrade again

  3. Update the SATA controller driver from the manufacturer#39;s website

  4. Perform a full backup and replace the hard drive

Correct Answer: C

Question No.88

A technician needs to edit a protected .dll file but cannot find the file in the System32 directory. Which of the following Control Panel utilities should the technician use?

  1. System

  2. Display

  3. Folder Options

  4. Indexing Options

Correct Answer: C

Question No.89

Which of the following is considered government-regulated data?

  1. PII

  2. End-user license agreement

  3. Digital Millennium Copyright Act

  4. DRM

Correct Answer: A

Question No.90

Ann, a user, is attempting to log in to her email service form a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid. Ann then decides to reset her email password, but after the reset, the new credentials still do not work in the third-party email client. Which of the following settings or features is responsible for the problems Ann is experiencing?

  1. Full device encryption

  2. Account lock

  3. Multifactor authentication

  4. Strong password requirements

Correct Answer: C

Get Full Version of 220-1002 Dumps

Categories
220-1002 Dumps

220-1002 Real Exam Dumps Questions and answers 31-40

Get Full Version of the Exam
http://www.EnsurePass.com/220-1002.html

Question No.31

Which of the following types of scripts would be seen on the user end of a web page?

  1. .bat

  2. .js

  3. .sh

  4. .vbs

Correct Answer: D

Question No.32

A security team is auditing a company#39;s network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information. Which of the following actions should be taken to close the vulnerability? (Select two.)

  1. Disable guest account

  2. Remove admin permissions

  3. Modify AutoRun settings

  4. Change default credentials

  5. Run OS security updates

  6. Install a software firewall

Correct Answer: AC

Question No.33

Ann, an employee at a company, calls the help disk to report issues logging on to a vendor#39;s website. Joe, the technician, is able to log in successfully with his credentials before going to Ann#39;s office. However, when he attempts to log in from Ann#39;s office, Joe experiences the same issue. Ann asks Joe questions about the new software installed on the laptop from the pop-up notification. Which of the following are the NEXT steps Joe should take to resolve the issue? (Select two.)

  1. Ask Ann for her credentials to verify and log on to the vendor#39;s website from Ann#39;s laptop

  2. Verify Ann#39;s laptop has the correct browser settings

  3. Check all browser cached files on Ann#39;s laptop and log on to another vendor#39;s website

  4. Attempt to log on to another vendor#39;s website from Ann#39;s laptop

  5. Ask Ann about the notification and review the installed programs

  6. Reinstall the browser, reboot the laptop, and check the vendor#39;s website again

Correct Answer: CE

Question No.34

A user#39;s corporate email is missing the shared inbox folders that were present before the user went on vacation. The technician verifies the user is connected to the domain and can still send and receive email. Which of the following is MOST likely causing the missing folders issue?

  1. The Internet security options have changed

  2. The operating system updates have changed

  3. The network directory permissions have changed

  4. The user account permissions have changed

Correct Answer: C

Question No.35

Joe, an employee, took a company-issues Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server. Joe has verified he is connected to the Internet. Which of the following would explain why Joe cannot access his personal shares?

  1. An IP conflict is present

  2. A corporate VPN is enabled

  3. A firewall exception must be set

  4. HomeGroup must be enabled

Correct Answer: C

Question No.36

Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?

  1. SSO

  2. Permission propagation

  3. Inheritance

  4. MFA

Correct Answer: A

Question No.37

A technician is attempting to repair a Windows computer that is infected with malware. The machine is quarantined but still cannot boot into a standard desktop. Which of the following is the most likely NEXT step?

  1. Disable System Restore.

  2. Create a restore point.

  3. Apply system updates.

  4. Restart into safe mode.

Correct Answer: D

Question No.38

Which of the following must be enabled to configure 20 new machines to be booted over a network?

  1. Multi-boot

  2. Dynamic

  3. PXE

  4. GPT

Correct Answer: C

Question No.39

A technician is repairing a computer. Which of the following should the technician do to protect the computer from accidental voltage spikes?

  1. Practice electrical fire safety.

  2. Clean tools properly before use.

  3. Remove any jewelry.

  4. Connect a proper ESD strap.

Correct Answer: D

Question No.40

A technician is in the process of upgrading Windows 8 to Windows 10. The technician needs to make sure all of the applications, user profiles, documents, and PST files are preserved. Which of the following methods would the technician MOST likely perform on the computer?

  1. Unattended installation

  2. Refresh upgrade

  3. Clean installation

  4. In-place upgrade

Correct Answer: B

Get Full Version of 220-1002 Dumps

Categories
220-1002 Dumps

220-1002 Real Exam Dumps Questions and answers 41-50

Get Full Version of the Exam
http://www.EnsurePass.com/220-1002.html

Question No.41

Which of the following BEST describes the Guest account on a Windows system?

  1. This account is designed to have the ability to set permissions for other users on the system. Users of this account have the capability to perform any operation or task on the system.

  2. This account is designed to provide basic permission for completing common daily tasks. Users of this account are restricted from performing things like installing new software.

  3. This account is designed for users who require specific administrator rights or permissions. Users of this account are restricted from installing software but can change time zones.

  4. This account is designed for users who require temporary access to a computer and do not need to store user-specific settings. Users of this account have very limited permissions.

Correct Answer: D

Question No.42

A technician is investigating an application that has crashed on a workstation. The application is displaying a generic error. Which of the following tools should the technician use?

  1. Performance Monitor

  2. Component Services

  3. Task Manager

  4. Event Viewer

Correct Answer: D

Question No.43

A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown while providing at least one hour of uptime in case of extreme weather conditions. Which of the following should a technician recommend?

  1. Uninterruptible power supply

  2. Surge protector

  3. Power strip

  4. Power distribution unit

Correct Answer: A

Question No.44

An administrator is setting up a Windows terminal server. Which of the following settings should the administrator modify to increase server security? (Select two.)

  1. Change the default access port

  2. Enforce password complexity

  3. Put the terminal server into the router#39;s DMZ

  4. Disable logon time restrictions

  5. Block all unused ports on the LAN smart switch

  6. Use the local client certificate for server authentication

Correct Answer: BE

Question No.45

A user notices recent print jobs are not printing to the local printer despite printing fine yesterday. There are no errors indicated on the taskbar printer icon. Which of the following actions should the user take FIRST?

  1. Check to ensure the printer selected is the default printer

  2. Check the status of the print server queue

  3. Cancel all documents and print them again

  4. Check that the printer is not offline print mode

Correct Answer: B

Question No.46

A user reports slow performance on a computer. A technician checks the computer and finds the RAM utilization Is very high. The technician restarts the computer, and the RAM use is still high. The technician discovers a program running in the background Is using most of the RAM. The user only uses this program once at the end of the year to produce a report. Which of the following steps should the technician take to improve the computer#39;s performance?

  1. Uninstall and reinstall the program.

  2. Perform a repair installation of the program

  3. Install the latest updates for the program.

  4. Disable the program on startup.

Correct Answer: A

Question No.47

A network administrator has noticed unusual activity with a user#39;s login credentials on the network. The user is attempting multiple simultaneous logins across the network, some of which are attempting to access workstations and servers to which the user does not have access Which of the following should the network administrator do NEXT?

  1. Delete the user#39;s AD account

  2. Decrease the user#39;s AD privileges

  3. Disable the user#39;s AD account

  4. Reset the password on the user#39;s AD account

Correct Answer: A

Question No.48

A technician has installed a second monitor for a customer, but the desktop font sizes do not match. Which of the following display settings should be technician adjust to correct this issue?

  1. Resolution

  2. Refresh rate

  3. Extended monitor

  4. Color depth

Correct Answer: A

Question No.49

A customer#39;s computer is having difficulty opening programs and regularly receives error messages regarding low system resources. Which of the following performance settings changes would BEST help customer temporarily until upgrade can be made?

  1. Data execution prevention

  2. Page-file size

  3. Visual effects

  4. Processor scheduling

Correct Answer: B

Question No.50

A user has reported that a computer is running extremely slow when opening applications. A technician checks the computer and needs to verify memory utilization. Which of the following tools should the technician use to begin troubleshooting the issue?

  1. Task Scheduler

  2. Device Manager

  3. Drive Status

  4. Performance

Correct Answer: D

Get Full Version of 220-1002 Dumps