220-1102 Practice Test Questions

739 Questions


Topic 5: Exam Pool E

A technician needs to track evidence for a forensic investigation on a Windows computer. Which of the following describes this process?


A. Valid license


B. Data retention requirements


C. Material safety data sheet


D. Chain of custody





D.
  Chain of custody

Explanation: Chain of custody is a legal term that refers to the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of materials, including physical or electronic evidence1. It is important in forensic investigations to establish that the evidence is in fact related to the case, and that it has not been tampered with or contaminated. A technician needs to track evidence for a forensic investigation on a Windows computer by following the proper procedures for collecting, handling, storing, and analyzing the evidence, and documenting every step of the process on a chain of custody form23

Which of the following is the most likely to use NTFS as the native filesystem?


A. macOS


B. Linux


C. Windows


D. Android





C.
  Windows

A user reports that antivirus software indicates a computer is infected with viruses. The user thinks this happened white browsing the internet. The technician does not recognize the interface with which the antivirus message is presented. Which of the following is the NEXT step the technician should take?


A. Shut down the infected computer and swap it with another computer


B. Investigate what the interface is and what triggered it to pop up


C. Proceed with initiating a full scan and removal of the viruses using the presented interface


D. Call the phone number displayed in the interface of the antivirus removal tool





C.
  Proceed with initiating a full scan and removal of the viruses using the presented interface

Explanation:
The technician should not proceed with initiating a full scan and removal of the viruses using the presented interface or call the phone number displayed in the interface of the antivirus removal tool12.
Shutting down the infected computer and swapping it with another computer is not necessary at this point12.
The technician should not immediately assume that the message is legitimate or perform any actions without knowing what the interface is and what triggered it to pop up. It is important to investigate the issue further, including checking the legitimacy of the antivirus program and the message it is displaying.

A technician requires graphical remote access to various Windows, Linux, and macOS desktops on the company LAN. The security administrator asks the technician to utilize a single software solution that does not require an external internet connection. Which of the following remote access tools is the technician most likely to install?


A. VNC


B. RMM


C. RDP


D. SSH





A.
  VNC

A company wants to remove information from past users' hard drives in order to reuse the hard drives Witch of the following is the MOST secure method


A. Reinstalling Windows


B. Performing a quick format


C. Using disk-wiping software


D. Deleting all files from command-line interface





C.
  Using disk-wiping software

Explanation:
Using disk-wiping software is the most secure method for removing information from past users’ hard drives in order to reuse the hard drives. Disk-wiping software can help to ensure that all data on the hard drive is completely erased and cannot be recovered.

Which of the following is also known as something you know, something you have, and something you are? ACL


A. MFA


B. SMS


C. NFC





B.
  SMS

Explanation: MFA stands for Multi-Factor Authentication, which is a method of verifying a user’s identity using two or more different factors of authentication. The three factors of authentication are something you know, something you have, and something you are. These factors correspond to different types of information or evidence that only the legitimate user should possess or provide. For example:
Something you know: a password, a PIN, a security question, etc.
Something you have: a smart card, a token, a mobile device, etc. Something you are: a fingerprint, a face, an iris, etc.
MFA provides a higher level of security than single-factor authentication, which only uses one factor, such as a password. MFA reduces the risk of unauthorized access, identity theft, and data breaches, as an attacker would need to compromise more than one factor to impersonate a user. MFA is commonly used for online banking, email accounts, cloud services, and other sensitive applications

A technician needs to exclude an application folder from being cataloged by a Windows 10 search. Which of the following utilities should be used?


A. Privacy


B. Indexing Options


C. System


D. Device Manager





B.
  Indexing Options

Explanation:
To exclude an application folder from being cataloged by a Windows 10 search, the technician should use the Indexing Options utility1.

An organization is updating the monitors on kiosk machines. While performing the upgrade, the organization would like to remove physical input devices. Which of the following utilities in the Control Panel can be used to turn on the on-screen keyboard to replace the physical input devices? Devices and Printers


A. Ease of Access


B. Programs and Features


C. Device Manager





B.
  Programs and Features

A technician is configuring a new Windows laptop Corporate policy requires that mobile devices make use of full disk encryption at all limes Which of the following encryption solutions should the technician choose?


A. Encrypting File System


B. FileVault


C. BitLocker


D. Encrypted LVM





A.
  Encrypting File System

Explanation:
The encryption solution that the technician should choose when configuring a new Windows laptop and corporate policy requires that mobile devices make use of full disk encryption at all times is BitLocker. This is because BitLocker is a full-disk encryption feature that encrypts all data on a hard drive and is included with Window

A technician is creating a location on a Windows workstation for a customer to store meeting minutes. Which of the following commands should the technician use?


A. c: \minutes


B. dir


C. rmdir


D. md





D.
  md

Explanation: The command md stands for make directory and is used to create a new directory or folder in the current location. In this case, the technician can use md minutes to create a folder named minutes in the C: drive. The other commands are not relevant for this task. c: \minutes is not a command but a path to a folder. dir is used to display a list of files and folders in the current directory. rmdir is used to remove or delete an existing directory or folder.

A technician has been tasked with using the fastest and most secure method of logging in to laptops. Which of the following log-in options meets these requirements?


A. PIN


B. Username and password


C. SSO


D. Fingerprint





A.
  PIN

This is because a PIN is a fast and secure method of logging in to laptops, and it is more secure than a password because it is not susceptible to keyloggers.

A user receives a call from someone claiming to be a technical support agent. The caller asks the user to log in to the computer. Which of the following security measures should the user take to ensure security and privacy?


A. Only accept calls from known people.


B. Disregard any suspicious emails.


C. Update the antivirus software.


D. Enable two-factor authentication.


E. Install a malware scanner.





A.
  Only accept calls from known people.


Page 9 out of 62 Pages
Previous