220-1102 Practice Test Questions

739 Questions


Topic 2: Exam Pool B

A user installed a new application that automatically starts each time the user logs in to a Windows 10 system. The user does not want this to happen and has asked for this setting to be changed. Which of the following tools would the technician MOST likely use to safely make this change?


A. Registry Editor


B. Task Manager


C. Event Viewer


D. Local Users and Groups





B.
  Task Manager

Explanation:
The technician would most likely use the Task Manager tool to safely make this change12 The Task Manager tool can be used to disable applications from starting automatically on Windows 10.
The tool that a technician would most likely use to stop an application from automatically starting when a user logs in to a Windows 10 system is the Task Manager. The Task Manager can be used to view and manage processes, including those that are set to automatically start when a user logs in to the system.

A user reports that an Android mobile device takes a long time to boot, and all applications crash when launched. The user installed the applications from a third-party website. Which of the following steps should the technician complete to diagnose the issue?


A. Scan the system for malware.


B. Clear the web browser cache.


C. Enroll the device in an MDM system.


D. Confirm the compatibility of the applications with the OS.





A.
  Scan the system for malware.

Explanation: When an Android device experiences slow boot times and application crashes after installing apps from a third-party website, scanning the system for malware is a critical first step. Third-party sources can often host malicious software that can compromise device performance and security. A malware scan can identify and remove such threats, potentially resolving the performance issues and application instability. Clearing the web browser cache, enrolling the device in an MDM system, and confirming app compatibility are useful steps but do not address the immediate concern of potential malware introduced by third-party app installations.

Which of the following commands lists running processes in Linux?


A. top


B. apt-get


C. Is


D. cat





A.
  top

Explanation: The 'top' command in Linux is used to display the running processes along with information about system resources like CPU and memory usage. It provides a real-time view of the system's resource consumption, making it an essential tool for monitoring and managing system performance.

In which of the following scenarios would remote wipe capabilities MOST likely be used? (Select TWO).


A. A new IT policy requires users to set up a lock screen PIN.


B. A user is overseas and wants to use a compatible international SIM Card.


C. A user left the phone at home and wants to prevent children from gaining access to the phone.


D. A user traded in the company phone for a cell carrier upgrade by mistake.


E. A user cannot locate the phone after attending a play at a theater.


F. A user forgot the phone in a taxi, and the driver called the company to return the device.





E.
  A user cannot locate the phone after attending a play at a theater.

F.
  A user forgot the phone in a taxi, and the driver called the company to return the device.

Explanation:
Remote wipe capabilities are used to erase all data on a mobile device remotely. This can be useful in situations where a device is lost or stolen, or when sensitive data needs to be removed from a device. Remote wipe capabilities are most likely to be used in the following scenarios:
E. A user cannot locate the phone after attending a play at a theater. F. A user forgot the phone in a taxi, and the driver called the company to return the device1.
In scenario E, remote wipe capabilities would be used to prevent unauthorized access to the device and to protect sensitive data. In scenario F, remote wipe capabilities would be used to erase all data on the device before it is returned to the user.

A user takes a work-issued laptop home for the first time. When the user attempts to browse any website on the home internet, the user receives the following error:
"This site cannot be reached."
A technician from work confirms that the static IP that was set up on the machine was changed back to DHCP. Which of the following needs to be corrected?


A. HTTPS


B. VLAN


C. DNS


D. SMTP





C.
  DNS

A new spam gateway was recently deployed at a small business However; users still occasionally receive spam. The management team is concerned that users will open the messages and potentially infect the network systems. Which of the following is the MOST effective method for dealing with this Issue?


A. Adjusting the spam gateway


B. Updating firmware for the spam appliance


C. Adjusting AV settings


D. Providing user training





D.
  Providing user training

The most effective method for dealing with spam messages in a small business is to provide user training1. Users should be trained to recognize spam messages and avoid opening them1. They should also be trained to report spam messages to the IT department so that appropriate action can be taken1. In addition, users should be trained to avoid clicking on links or downloading attachments from unknown sources1. By providing user training, the management team can reduce the risk of users opening spam messages and potentially infecting the network systems1.

A technician needs to upgrade a legacy system running on a 32-bit OS with new applications that can work both on a 32-bit and a 64-bit system. The legacy system is critically important to the organization. The IT manager cautions that the new applications must not have a detrimental effect on company finances. Which of the following impacts is the IT manager most concerned with?


A. Device


B. Business


C. Network


D. Operation





B.
  Business

Explanation: The IT manager's caution regarding the new applications not having a detrimental effect on company finances points directly to concerns about the business impact. This encompasses potential costs associated with upgrading legacy systems, compatibility issues that might arise from running new applications on old infrastructure, and the risks of system downtime or reduced performance affecting business operations. The focus here is on ensuring that the integration of new applications into the legacy system does not incur unexpected expenses or disrupt critical business processes.

An employee using an Apple MacBook is receiving frequent, random pop-up requests from other Apple devices wanting to share photos and videos and asking whether the user would like to accept the request Which of the following configurations should the technician advise the user to change first"?


A. Wi-Fi


B. iCloud


C. Antivirus


D. AirDrop





D.
  AirDrop

Explanation: AirDrop is a feature on Apple devices that allows users to wirelessly share files, photos, and videos with nearby Apple devices. If the MacBook is receiving unsolicited AirDrop requests, adjusting the AirDrop settings to allow sharing with contacts only or turning it off completely can help prevent these random pop-up requests.

A user calls the help desk and reports a workstation is infected with malicious software. Which of the following tools should the help desk technician use to remove the malicious software? (Select TWO).


A. File Explorer


B. User Account Control


C. Windows Backup and Restore


D. Windows Firewall


E. Windows Defender


F. Network Packet Analyzer





A.
  File Explorer

E.
  Windows Defender

Explanation:
The correct answers are E. Windows Defender and A. File Explorer. Windows Defender is a built-in antivirus program that can detect and remove malicious software from a workstation. File Explorer can be used to locate and delete files associated with the malicious software1.

A technician is upgrading the Microsoft Windows 10 OS. Which of the following are required for the technician to safely upgrade the OS? (Select two).


A. Release notes


B. Antivirus software


C. Backup of critical data


D. Device drivers


E. Word processing software


F. Safe boot mode





C.
  Backup of critical data

D.
  Device drivers

Explanation: To safely upgrade the Microsoft Windows 10 OS, it is essential to backup critical data (C) and ensure that you have the necessary device drivers (D). Backing up critical data protects against potential data loss during the upgrade process. Having the correct device drivers ensures that the hardware components function properly with the new OS version, preventing issues like loss of functionality or compatibility problems.

While browsing the internet, a customer sees a window stating antivirus protection is no longer functioning Which of the following steps should a technician take next? (Select two).


A. Isolate the computer from the network


B. Enable the firewall service.


C. Update the endpoint protection software


D. Use System Restore to undo changes.


E. Delete the browser cookies


F. Run sfc /scannow.





A.
  Isolate the computer from the network

Explanation: When encountering a warning about antivirus protection malfunctioning, the first step should be to isolate the computer from the network to prevent potential spread of malware. Updating the endpoint protection software is also crucial to ensure the latest virus definitions and security features are in place to effectively identify and remove the threat.

A technician wants to securely dispose of storage drives. Which of the following is the best way to eliminate data on SSDs?


A. Degaussing


B. Shredding


C. Erasing


D. Drilling





B.
  Shredding

Explanation: For securely disposing of SSDs, physical destruction methods like shredding are considered most effective: Shredding: This method involves physically breaking the SSD into small pieces, making data recovery practically impossible. It's a recommended practice for ensuring that sensitive data on SSDs is irretrievably destroyed.


Page 22 out of 62 Pages
Previous