220-1102 Practice Test Questions

739 Questions


Topic 5: Exam Pool E

Which of the following items require special e-waste recycling? (Select two). Solid-state drive


A. A/C adapter


B. Surge protector


C. Laptop battery


D. CRT monitor


E. Power supply





D.
  CRT monitor

E.
  Power supply

A technician has identified malicious traffic originating from a user's computer. Which of the following is the best way to identify the source of the attack?


A. Investigate the firewall logs.


B. Isolate the machine from the network.


C. Inspect the Windows Event Viewer.


D. Take a physical inventory of the device.





B.
  Isolate the machine from the network.

Explanation: Isolating the machine from the network is the best way to identify the source of the attack, because it prevents the malicious traffic from spreading to other devices or reaching the attacker. Isolating the machine can also help preserve the evidence of the attack, such as the malware files, the network connections, the registry entries, or the system logs. By isolating the machine, a technician can safely analyze the machine and determine the source of the attack, such as a phishing email, a compromised website, a removable media, or a network vulnerability.

Which of the following OS types provides a lightweight option for workstations thai need an easy-to-use browser-based interface?


A. FreeBSD


B. Chrome OS


C. macOS


D. Windows





B.
  Chrome OS

Explanation:
Chrome OS provides a lightweight option for workstations that need an easy-to-use browser-based interface1

Which of the following is command options is used to display hidden files and directories?


A. -a


B. -s


C. -lh


D. -t





A.
  -a

Explanation: The -a option is used to display hidden files and directories in a command-line interface. Hidden files and directories are those that start with a dot (.) and are normally not shown by default. The -a option stands for “all” and shows all files and directories, including the hidden ones. The -a option can be used with commands such as ls, dir, or find to list or search for hidden files and directories. The -s, -lh, and -t options are not used to display hidden files and directories. The -s option stands for “size” and shows the size of files or directories in bytes. The -lh option stands for “long human-readable” and shows the size of files or directories in a more readable format, such as KB, MB, or GB. The -t option stands for “time” and sorts the files or directories by modification time.

A user has requested help setting up the fingerprint reader on a Windows 10 laptop. The laptop is equipped with a fingerprint reader and is joined to a domain Group Policy enables Windows Hello on all computers in the environment. Which of the following options describes how to set up Windows Hello Fingerprint for the user?


A. Navigate to the Control Panel utility, select the Security and Maintenance submenu, select Change Security and Maintenance settings, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete


B. Navigate to the Windows 10 Settings menu, select the Accounts submenu, select Sign in options, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete.


C. Navigate to the Windows 10 Settings menu, select the Update & Security submenu select Windows Security, select Windows Hello Fingerprint and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete


D. Navigate to the Control Panel utility, select the Administrative Tools submenu, select the user account in the list, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete.





B.
  Navigate to the Windows 10 Settings menu, select the Accounts submenu, select Sign in options, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete.

Explanation:
Navigate to the Windows 10 Settings menu, select the Accounts submenu, select Sign in options, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete. Windows Hello Fingerprint can be set up by navigating to the Windows 10 Settings menu, selecting the Accounts submenu, selecting Sign in options, and then selecting Windows Hello Fingerprint. The user will then be asked to place a fingerprint on the fingerprint reader repeatedly until Windows indicates that setup is complete. Windows Hello Fingerprint allows the user to log into the laptop using just their fingerprint, providing an additional layer of security.

A technician is unable to completely start up a system. The OS freezes when the desktop background appears, and the issue persists when the system is restarted. Which of the following should the technician do next to troubleshoot the issue?


A. Disable applicable BIOS options.


B. Load the system in safe mode.


C. Start up using a flash drive OS and run System Repair.


D. Enable Secure Boot and reinstall the system.





B.
  Load the system in safe mode.

Explanation: Loading the system in safe mode is a common troubleshooting step that allows the technician to isolate the problem by disabling unnecessary drivers and services. This can help determine if the issue is caused by a faulty device, a corrupted system file, or a malware infection.

Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident?


A. Pretexting


B. Spoofing


C. Vishing


D. Scareware





C.
  Vishing

Explanation:
Vishing is a type of social engineering attack where a fraudulent caller impersonates a legitimate entity, such as a bank or financial institution, in order to gain access to sensitive information. The caller will typically use a variety of techniques, such as trying to scare the target or providing false information, in order to get the target to provide the information they are after. Vishing is often used to gain access to usernames, passwords, bank account information, and other sensitive data.

Which of the following file types allows a user to easily uninstall software from macOS by simply placing it in the trash bin? .exe


A. .dmg


B. . app


C. . rpm


D. .pkg





C.
  . rpm

The network was breached over the weekend System logs indicate that a single user's account was successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST mitigate this threat?


A. Encryption at rest


B. Account lockout


C. Automatic screen lock


D. Antivirus





B.
  Account lockout

Explanation:
Account lockout would best mitigate the threat of a dictionary attack1

Which of the following protocols supports fast roaming between networks?


A. WEP


B. WPA


C. WPA2


D. LEAP


E. PEAP





C.
  WPA2

Explanation: WPA2 is the only protocol among the options that supports fast roaming between networks. Fast roaming, also known as IEEE 802.11r or Fast BSS Transition (FT), enables a client device to roam quickly in environments implementing WPA2 Enterprise security, by ensuring that the client device does not need to re-authenticate to the RADIUS server every time it roams from one access point to another1. WEP, WPA, LEAP, and PEAP do not support fast roaming and require the client device to perform the full authentication process every time it roams, which can cause delays and interruptions in the network service.

An organization is creating guidelines for the incorporation of generative Al solutions. In which of the following would these guidelines be published? Standard operating procedure


A. Acceptable use policy


B. Security protocols


C. Data flow diagram





B.
  Security protocols

A user's mobile phone has become sluggish A systems administrator discovered several malicious applications on the device and reset the phone. The administrator installed MDM software. Which of the following should the administrator do to help secure the device against this threat in the future? (Select TWO).


A. Prevent a device root


B. Disable biometric authentication


C. Require a PIN on the unlock screen


D. Enable developer mode


E. Block a third-party application installation


F. Prevent GPS spoofing





C.
  Require a PIN on the unlock screen

E.
  Block a third-party application installation

Explanation:
To help secure the device against this threat in the future, the administrator should require a PIN on the unlock screen and block a third-party application installation. Requiring a PIN on the unlock screen can help to prevent unauthorized access to the device, while blocking third-party application installation can help to prevent malicious applications from being installed on the device.


Page 8 out of 62 Pages
Previous