220-1102 Practice Test Questions

739 Questions


Topic 5: Exam Pool E

A user's company phone was stolen. Which of the following should a technician do next?


A. Perform a low-level format.


B. Remotely wipe the device.


C. Degauss the device.


D. Provide the GPS location of the device.





A user's Windows computer seems to work well at the beginning of the day. However, its performance degrades throughout the day, and the system freezes when several applications are open. Which of the following should a technician do to resolve the issue? (Select two). Install the latest GPU drivers.


A. Reinstall the OS.


B. Increase the RAM.


C. Increase the hard drive space.


D. Uninstall unnecessary software.


E. Disable scheduled tasks.





A technician has verified a computer is infected with malware. The technician isolates the system and updates the anti-malware software. Which of the following should the technician do next?


A. Run one scan and schedule future scans.


B. Back up the uninfected files and reimage the computer.


C. Restore the clean backup copies of the infected files.


D. Run repeated remediation scans until the malware is removed.





A laptop that was in the evidence room of a police station is missing. Which of the following is the best reason to refer to chain of custody documentation?


A. To determine which party had the machine and when.


B. To remotely wipe sensitive data from the machine.


C. To gather the information needed to replace the machine.


D. To alert the owner that the password needs to be changed.





A technician wants to mitigate unauthorized data access if a computer is lost or stolen. Which of the following features should the technician enable?


A. Network share


B. Group Policy


C. BitLocker


D. Static IP





Which of the following languages is used for scripting the creation of Active Directory accounts?


A. Bash


B. SQL


C. PHP


D. PowerShell





A technician successfully removed malicious software from an infected computer after running updates and scheduled scans to mitigate future risks. Which of the following should the technician do next?


A. Educate the end user on best practices for security.


B. Quarantine the host in the antivirus system.


C. Investigate how the system was infected with malware.


D. Create a system restore point.





A technician cannot uninstall a system driver because the driver is currently in use. Which of the following tools should the technician use to help uninstall the driver?


A. msinfo32.exe


B. dxdiag.exe


C. msconfig.exe


D. regedit.exe





A large company is changing its password length requirements. The Chief Information Officer is mandating that passwords now be at least 12 characters long, instead of 10. Which of the following should be used to adjust this setting?


A. User accounts


B. Access control lists


C. Authenticator applications





A technician is familiar with most personnel at a customer's location and has clearance to work unsupervised. Which of the following describes how the technician should handle personal communication while on site?


A. Respond to calls and text messages while on site but not when working directly with personnel.


B. Respond to calls and text messages only from family.


C. Respond to calls and text messages only when an emergency situation requires a response.


D. Respond to calls and text messages discreetly while on site.





A Linux technician needs a filesystem type that meets the following requirements:
. All changes are tracked. . The possibility of file corruption is reduced. · Data recovery is easy.
Which of the following filesystem types best meets these requirements?
ext3


A. FAT32


B. exFAT


C. NTFS





A company is recycling old hard drives and wants to quickly reprovision the drives for reuse. Which of the following data destruction methods should the company use?


A. Degaussing


B. Standard formatting


C. Low-level wiping


D. Deleting






Page 1 out of 62 Pages