220-1102 Practice Test Questions

739 Questions


Topic 1: Exam Pool A

A company needs to securely dispose of data stored on optical discs. Which of the following is the MOST effective method to accomplish this task?


A. Degaussing


B. Low-level formatting


C. Recycling


D. Shredding





D.
  Shredding

Explanation:
Shredding is the most effective method to securely dispose of data stored on optical discs12
References: 4. How Can I Safely Destroy Sensitive Data CDs/DVDs? - How-To Geek.
Retrieved from https://www.howtogeek.com/174307/how-can-i-safely-destroy-sensitivedata- cdsdvds/ 5. Disposal — UK Data Service. Retrieved from https://ukdataservice.ac.uk/learning-hub/research-data-management/store-yourdata/ disposal/

A technician needs to update the software on several hundred Mac laptops. Which of the following is the best method to complete the task?


A. SSH


B. MDM


C. RDP


D. SFTP





B.
  MDM

Explanation: For updating software on several hundred Mac laptops, the best method is Mobile Device Management (MDM). MDM solutions allow administrators to remotely manage and update software across multiple devices efficiently, making it an ideal choice for handling software updates on a large scale.

A technician is replacing the processor in a desktop computer prior to opening the computer, the technician wants to ensure the internal components are protected. Which of the following safety procedures would BEST protect the components in the PC? (Select TWO).


A. Utilizing an ESD strap


B. Disconnecting the computer from the power source


C. Placing the PSU in an antistatic bag


D. Ensuring proper ventilation


E. Removing dust from the ventilation fans


F. Ensuring equipment is grounded





A.
  Utilizing an ESD strap

C.
  Placing the PSU in an antistatic bag

Explanation:
The two safety procedures that would best protect the components in the PC are:

  • Utilizing an ESD strap
  • Placing the PSU in an antistatic bag

A user is experiencing the following issues with Bluetooth on a smartphone:

•The user cannot hear any sound from a speaker paired with the smartphone.
•The user is having issues synchronizing data from their smart watch, which is also connected via Bluetooth.

A technician checked the Bluetooth settings, confirmed it is successfully paired with a speaker, and adjusted the volume levels, but still could not hear anything. Which of the following steps should the technician take next to troubleshoot the Bluetooth issues?


A. Restart the smartphone.


B. Reset the network settings.


C. Unpair the Bluetooth speaker.


D. Check for system updates.





A.
  Restart the smartphone.

Which of the following is the MOST cost-effective version of Windows 10 that allows remote access through Remote Desktop?


A. Home


B. Pro for Workstations


C. Enterprise


D. Pro





B.
  Pro for Workstations

The most cost-effective version of Windows 10 that allows remote access through Remote Desktop is Windows 10 Pro. Windows 10 Pro includes Remote Desktop, which allows users to connect to a remote computer and access its desktop, files, and applications. Windows 10 Home does not include Remote Desktop, while Windows 10 Pro for Workstations and Windows 10 Enterprise are more expensive versions of Windows 10 that include additional features for businesses

A user submits a request to have a graphics application installed on a desktop When the technician attempts to install the application, the installation fails and the error message "Not compatible with OS' is displayed. Which of the following is the most likely reason for this error message?


A. Thegraphics card driver needs to beupdated


B. Theapplication installer is 64-bit.


C. Theinstallation requires administrative rights.


D. Thedisk space is inadequate.





C.
  Theinstallation requires administrative rights.

Explanation: The most likely reason for an error message stating "Not compatible with OS" during a software installation is that the installation requires administrative rights. Many software installations, especially those that affect system files or install drivers, require administrative privileges to execute correctly. Without these rights, the installer cannot make the necessary changes to the system, leading to such error messages.

A user clicked a link in an email, and now the cursor is moving around on its own. A technician notices that File Explorer is open and data is being copied from the local drive to an unknown cloud storage location. Which of the following should the technician do first?


A. Investigate the reported symptoms.


B. Run anti-malware software.


C. Educate the user about dangerous links.


D. Quarantine the workstation.





D.
  Quarantine the workstation.

Explanation: When a user's cursor is moving on its own and unauthorized data transfer is occurring, the first step a technician should take is to Quarantine the workstation. This involves isolating the affected system from the network to prevent the spread of malware or unauthorized access to other parts of the network. Quarantining helps in containing the threat and provides a safe environment to investigate and remediate the issue without risking further contamination or data loss.

A change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process?


A. End user acceptance


B. Perform risk analysis


C. Communicate to stakeholders


D. Sandbox testing





C.
  Communicate to stakeholders

Explanation:
The risk analysis should be performed before it's taken to the board. The step after the board approves the change is End User Agreement.

An administrator needs to back up the following components of a single workstation:

•The installation of the operating system •Applications •User profiles •System settings

Which of the following backup methods can the administrator use to ensure the workstation is properly backed up?


A. Differential


B. Image


C. Synthetic


D. Archive





B.
  Image

Explanation: An image backup captures a complete snapshot of the entire system at a specific point in time, including the operating system, installed applications, user profiles, and system settings. This method is most suitable for backing up the components listed in the question because it ensures that every aspect of the workstation, from the core OS to individual user settings, is preserved and can be restored in its entirety. This is crucial for quickly recovering a system to a fully operational state after a failure or when migrating to new hardware. Other methods like differential, synthetic, and archive backups do not provide the comprehensive one-step restoration capability that an image backup offers for the complete system recovery.

A user calls the help desk to report potential malware on a computer. The anomalous activity began after the user clicked a link to a free gift card in a recent email The technician asks the user to describe any unusual activity, such as slow performance, excessive popups, and browser redirections. Which of the following should the technician do NEXT?


A. Advise the user to run a complete system scan using the OS anti-malware application


B. Guide the user to reboot the machine into safe mode and verify whether the anomalous activities are still present


C. Have the user check for recently installed applications and outline those installed since the link in the email was clicked


D. Instruct the user to disconnect the Ethernet connection to the corporate network





D.
  Instruct the user to disconnect the Ethernet connection to the corporate network

Explanation:
First thing you want to do is quarantine/disconnect the affected system from the network so whatever malicious software doesn't spread.

A technician needs to configure a computer for a user to work from home so the user can still securely access the user’s shared files and corporate email. Which of the following tools would best accomplish this task*?


A. MSRA


B. FTP


C. RMM


D. VPN





D.
  VPN

Explanation: A Virtual Private Network (VPN) creates a secure connection over the internet to a network, allowing a user to access shared files and corporate email as if they were directly connected to the network. This makes VPN the best tool for secure remote work access, compared to the other options which do not offer the same level of secure, remote network access.

A technician is asked to resize a partition on the internal storage drive of a computer running macOS. Which of the followings tools should the technician use to accomplish this task?


A. Consoltf


B. Disk Utility


C. Time Machine


D. FileVault





B.
  Disk Utility

Explanation:
The technician should use Disk Utility to resize a partition on the internal storage drive of a computer running macOS. Disk Utility is a built-in utility that allows users to manage disks, partitions, and volumes on a Mac. It can be used to resize, create, and delete partitions, as well as to format disks and volumes.


Page 19 out of 62 Pages
Previous