220-1102 Practice Test Questions

739 Questions


Topic 5: Exam Pool E

A computer technician is investigating a computer that is not booting. The user reports that the computer was working prior to shutting it down last night. The technician notices a removable USB device is inserted, and the user explains the device is a prize the user received in the mail yesterday. Which of the following types of attacks does this describe?


A. Phishing


B. Dumpster diving


C. Tailgating


D. Evil twin





D.
  Evil twin

A technician is unable to join a Windows 10 laptop to a domain Which of the following is the MOST likely reason?


A. The domain's processor compatibility is not met


B. The laptop has Windows 10 Home installed


C. The laptop does not have an onboard Ethernet adapter


D. The Laptop does not have all current Windows updates installed





C.
  The laptop does not have an onboard Ethernet adapter

A change advisory board did not approve a requested change due to the lack of alternative actions if implementation failed. Which of the following should be updated before requesting approval again?


A. Scope of change


B. Risk level


C. Rollback plan


D. End user acceptance





C.
  Rollback plan

Explanation:
The rollback plan should be updated before requesting approval again. A rollback plan is a plan for undoing a change if it causes problems, and it is an important part of any change management process. If the change advisory board did not approve the requested change due to the lack of alternative actions if implementation failed, then updating the rollback plan would be the best way to address this concern.

A technician is installing software on a user's workstation. The installation fails due to incompliance with the HCL. Which of the following components is most likely causing the installation to fail? (Select two).


A. NIC


B. CPU


C. PSU


D. KVM


E. RAM


F. DVI





A.
  NIC

B.
  CPU

Explanation: The Hardware Compatibility List (HCL) is a list that indicates hardware components that are compatible with a specific software or operating system. If software installation fails due to incompliance with the HCL, it's most likely due to core hardware components like the Network Interface Card (NIC) or the Central Processing Unit (CPU) not being supported or not meeting the software's minimum hardware requirements. The PSU, KVM, RAM, and DVI are less likely to directly impact software compatibility as defined by the HCL.

A user is experiencing frequent malware symptoms on a Windows workstation. The user has tried several times to roll back the state but the malware persists. Which of the following would MOST likely resolve the issue?


A. Quarantining system files


B. Reimaging the workstation


C. Encrypting the hard drive


D. Disabling TLS 1.0 support





C.
  Encrypting the hard drive

Explanation:
Encrypting the hard drive would most likely resolve the issue.

Following the latest Windows update PDF files are opening in Microsoft Edge instead of Adobe Reader. Which of the following utilities should be used to ensure all PDF files open in Adobe Reader?


A. Network and Sharing Center


B. Programs and Features


C. Default Apps


D. Add or Remove Programs





C.
  Default Apps

Explanation:
Default Apps should be used to ensure all PDF files open in Adobe Reader.

A technician has spent hours trying to resolve a computer issue for the company's Chief Executive Officer (CEO). The CEO needs the device returned as soon as possible. Which of the following steps should the technician take NEXT?


A. Continue researching the issue


B. Repeat the iterative processes


C. Inform the CEO the repair will take a couple of weeks


D. Escalate the ticket





D.
  Escalate the ticket

Explanation:
The technician should escalate the ticket to ensure that the CEO’s device is returned as soon as possible.

An organization is centralizing support functions and requires the ability to support a remote user's desktop. Which of the following technologies will allow a technician to see the issue along with the user?


A. RDP


B. VNC


C. SSH


D. VPN





B.
  VNC

Explanation:
VNC will allow a technician to see the issue along with the user when an organization is centralizing support functions and requires the ability to support a remote user’s desktop.

Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?


A. Acceptable use


B. Chain of custody


C. Security policy


D. Information management





B.
  Chain of custody

Explanation:
The aspect of forensic evidence life cycle that must be maintained when dealing with a piece of evidence is chain of custody. This is because chain of custody is the documentation of the movement of evidence from the time it is collected to the time it is presented in court, and it is important to maintain the integrity of the evidence.

Ann, a CEO, has purchased a new consumer-class tablet for personal use, but she is unable to connect it to the company’s wireless network. All the corporate laptops are connecting without issue. She has asked you to assist with getting the device online.

 
INSTRUCTIONS
Review the network diagrams and device configurations to determine the cause of the problem and resolve any discovered issues.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.






A technician suspects a rootkit has been installed and needs to be removed. Which of the following would BEST resolve the issue?


A. Application updates


B. Anti-malware software


C. OS reinstallation


D. File restore





C.
  OS reinstallation

Explanation:
If a rootkit has caused a deep infection, then the only way to remove the rootkit is to reinstall the operating system. This is because rootkits are designed to be difficult to detect and remove, and they can hide in the operating system’s kernel, making it difficult to remove them without reinstalling the operating system.

A customer service representative is unable to send jobs to a printer at a remote branch office. However, the representative can print successfully to a local network printer. Which of the following commands should a technician use to view the path of the network traffic from the PC?


A. netstat


B. ping


C. format


D. tracert





D.
  tracert

Explanation: The "tracert" command is used to view the path that network traffic takes from a PC to a specified destination. It is helpful in identifying where along the path the traffic may be failing or experiencing delays. In the scenario where a customer service representative can't send jobs to a remote printer but can print locally, "tracert" can help diagnose if there's a network routing issue affecting the connection to the remote branch office.


Page 17 out of 62 Pages
Previous