220-1102 Practice Test Questions

739 Questions


Topic 1: Exam Pool A

A technician needs to recommend the best backup method that will mitigate ransomware attacks. Only a few files are regularly modified, however, storage space is a concern. Which of the following backup methods would BEST address these concerns?


A. Full


B. Differential


C. Off-site


D. Grandfather-father-son





B.
  Differential

Explanation:
The differential backup method would best address these concerns. Differential backups only back up files that have changed since the last full backup, which means that only a few files would be backed up each time. This would help to mitigate the risk of ransomware attacks, as only a few files would be affected if an attack occurred. Additionally, differential backups require less storage space than full backups.

A technician is configuring a SOHO device Company policy dictates that static IP addresses cannot be used. The company wants the server to maintain the same IP address at all times. Which of the following should the technician use?


A. DHCP reservation


B. Port forwarding


C. DNS A record


D. NAT





A.
  DHCP reservation

Explanation:
The technician should use DHCP reservation to maintain the same IP address for the server at all times. DHCP reservation allows the server to obtain an IP address dynamically from the DHCP server, while ensuring that the same IP address is assigned to the server each time it requests an IP address.

Which of the following involves sending arbitrary characters in a web page request?


A. SMS


B. SSL


C. XSS


D. VPN





C.
  XSS

Explanation: XSS stands for cross-site scripting, which is a web security vulnerability that allows an attacker to inject malicious code into a web page that is viewed by other users1. XSS involves sending arbitrary characters in a web page request, such as a query string, a form field, a cookie, or a header, that contain a malicious script. The web server does not validate or encode the input, and returns it as part of the web page response. The browser then executes the script, which can perform various actions on behalf of the attacker, such as stealing cookies, session tokens, or other sensitive information, redirecting the user to a malicious site, or displaying fake content

A technician found that an employee is mining cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. Which of the following should be updated to reflect this new requirement?


A. MDM


B. EULA


C. IRP


D. AUP





D.
  AUP

Explanation:
AUP (Acceptable Use Policy) should be updated to reflect this new requirement. The AUP is a document that outlines the acceptable use of technology within an organization. It is a set of rules that employees must follow when using company resources. The AUP should be updated to include a policy on cryptocurrency mining on work desktops.

A technician is partitioning a hard disk. The five primary partitions should contain 4TB of free space. Which of the following partition styles should the technician use to partition the device?


A. EFS


B. GPT


C. MBR


D. FAT32





B.
  GPT

Explanation: GPT is the correct answer for this question. GPT stands for GUID Partition Table, and it is a partition style that supports up to 128 primary partitions and up to 18 exabytes of disk size per partition. GPT also uses a unique identifier for each partition and provides better data protection and recovery. GPT is suitable for partitioning a hard disk that has five primary partitions with 4TB of free space each. EFS, MBR, and FAT32 are not correct answers for this question. EFS stands for Encrypting File System, and it is a feature that allows encrypting files and folders on NTFS volumes. EFS is not a partition style, but rather a file system attribute. MBR stands for Master Boot Record, and it is an older partition style that supports up to four primary partitions and up to 2TB of disk size per partition. MBR cannot handle five primary partitions with 4TB of free space each. FAT32 stands for File Allocation Table 32, and it is a file system that supports up to 32GB of disk size per partition and up to 4GB of file size. FAT32 is not a partition style, but rather a file system type.

Remote employees need access to information that is hosted on local servers at the company. The IT department needs to find a solution that gives employees secure access to the company's resources as if the employees were on premises. Which of the following remote connection services should the IT team implement?


A. SSH


B. VNC


C. VPN


D. RDP





C.
  VPN

Explanation: A VPN (Virtual Private Network) is a service that allows remote employees to access the company’s network resources securely over the internet as if they were on premises. A VPN encrypts the data traffic between the employee’s device and the VPN server, and assigns the employee a virtual IP address that belongs to the company’s network. This way, the employee can access the local servers, files, printers, and other resources without exposing them to the public internet. A VPN also protects the employee’s privacy and identity by masking their real IP address and location.

When a user calls in to report an issue, a technician submits a ticket on the user's behalf. Which of the following practices should the technician use to make sure the ticket is associated with the correct user?


A. Have the user provide a callback phone number to be added to the ticket


B. Assign the ticket to the department's power user


C. Register the ticket with a unique user identifier


D. Provide the user with a unique ticket number that can be referenced on subsequent calls.





D.
  Provide the user with a unique ticket number that can be referenced on subsequent calls.

Explanation:
The technician should provide the user with a unique ticket number that can be referenced on subsequent calls to make sure the ticket is associated with the correct user. This is because registering the ticket with a unique user identifier, having the user provide a callback phone number to be added to the ticket, or assigning the ticket to the department’s power user will not ensure that the ticket is associated with the correct user2.

An engineer is configuring a new server that requires a bare-metal installation. Which of the following installation methods should the engineer use if installation media is not available on site?


A. Image deployment


B. Recovery partition installation


C. Remote network installation


D. Repair installation





D.
  Repair installation

An Android user reports that when attempting to open the company's proprietary mobile application it immediately doses. The user states that the issue persists, even after rebooting the phone. The application contains critical information that cannot be lost. Which of the following steps should a systems administrator attempt FIRST?


A. Uninstall and reinstall the application


B. Reset the phone to factory settings


C. Install an alternative application with similar functionality


D. Clear the application cache





A.
  Uninstall and reinstall the application

Explanation: The systems administrator should clear the application cache12. If clearing the application cache does not work, the systems administrator should uninstall and reinstall the application12. Resetting the phone to factory settings is not necessary at this point12. Installing an alternative application with similar functionality is not necessary at this point12.

Which of the following filesystems replaced FAT as the preferred filesystem for Microsoft Windows OS?


A. APFS


B. FAT32


C. NTFS


D. ext4





C.
  NTFS

A technician is setting up a SOHO wireless router. The router is about ten years old. The customer would like the most secure wireless network possible. Which of the following should the technician configure?


A. WPA2 with TKIP


B. WPA2 with AES


C. WPA3withAES-256


D. WPA3 with AES-128





B.
  WPA2 with AES

Explanation:
This is because WPA2 with AES is the most secure wireless network configuration that is available on a ten-year-old SOHO wireless router.

A call center technician receives a call from a user asking how to update Windows Which of the following describes what the technician should do?


A. Have the user consider using an iPad if the user is unable to complete updates


B. Have the user text the user's password to the technician.


C. Ask the user to click in the Search field, type Check for Updates, and then press the Enter key


D. Advise the user to wait for an upcoming, automatic patch





C.
  Ask the user to click in the Search field, type Check for Updates, and then press the Enter key

Explanation:
The technician should guide the user to update Windows through the built-in "Check for Updates" feature. This can be done by having the user click in the Search field, type "Check for Updates", and then press the Enter key. This will bring up the Windows Update function, which will search for any available updates and give the user the option to install them.


Page 14 out of 62 Pages
Previous