Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
220-1002
Free trial
Verified
Question 26
A technician receives a phone call regarding ransomware that has been detected on a PC in a remote office.
Which of the following steps should the technician take FIRST?
- A: Disconnect the PC from the network
- B: Perform an antivirus scan
- C: Run a backup and restore
- D: Educate the end user
Question 27
A technician performs a virus cleaning on a computer that has been redirecting all browsers to a phishing website. System Restore was turned off before the cleaning. The technician runs the machine through several scanners, and then tests for redirection. A smaller number of sites are still redirecting to the phishing website. The antivirus software correctly blocks the website.
Which of the following should the technician do NEXT?
- A: Check the contents of the hosts file
- B: Do a System Restore to a date before the infection
- C: Rerun the antivirus scan with higher sensitivity
- D: Rebuild the OS on the machine
Question 28
A user calls a technician to report issues when logging in to a vendor's website. The technician is able to log in successfully before going to the office. However, the technician is unable to log in when in the user's office. The user also informs the technician of strange pop-up notifications.
Which of the following are the MOST likely causes of these issues? (Choose two.)
- A: System files have been deleted
- B: Proxy settings are configured improperly
- C: The OS has been updated recently
- D: There are disabled services on the vendor website
- E: Program file permissions have changed recently
- F: There is a rogue anti-malware program
Question 29
Which of the following is a reason to use WEP over WPA?
- A: Device compatibility
- B: Increased security
- C: TACACS
- D: Multifactor authentication
Question 30
When a user browses to a favorite website on a Windows laptop, a different website opens. A technician installs an additional web browser, but it also opens to the same unfamiliar site. The technician resets the web browser settings back to default, but the issue persists.
Which of the following troubleshooting steps should the technician complete NEXT?
- A: Change the browser's home page
- B: Check the Windows host file
- C: Update the default web browser
- D: Restore Windows to a previous date
Question 31
Which of the following Windows OS technologies is used to store remote data accessed via a WAN connection on local servers for user access?
- A: BranchCache
- B: Swap partition
- C: Domain access
- D: Proxy server
Question 32
Joe, a user, calls the help desk from a coffee shop while on a business trip to report the WiFi hotspot on his phone is extremely slow. The technician runs a speed test from a laptop connected to the hotspot and gets 200Kbps. Ann, Joe's coworker with whom he is travelling, also has a hotspot on her phone, and the speed test result on that hotspot is 15Mbps. The technician checks the hotspot settings on Joe's phone and sees the following:
Which of the following is the MOST likely cause of the problem?
- A: Joe should be using WEP security on his hotspot for faster throughput
- B: Someone else is using Joe's hotspot due to weak password
- C: Joe's hotspot gave him an invalid IP address
- D: Joe is likely in a poor signal area and should try another area
Question 33
A user who is running Windows 10 logs into a machine and notices that shared drives are missing, the My Documents folder is empty, and personal settings are reset.
Which of the following would be required to resolve the issue?
- A: Remove the registry entry and rename the local account folder
- B: Delete or rename the local user folder
- C: Run DISM and re-add the local power user account
- D: Remove the user account in Credential Manager and restart the PC
Question 34
A technician is working at a help desk firm and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in.
Which of the following is the BEST choice for the technician to make?
- A: Politely ask the user to call back
- B: Ask another technician to take the call
- C: Troubleshoot the issue for the user
- D: Input the issue as a ticket and escalate to Tier 2
- E: Put the user on hold and troubleshoot after the scheduled break
Question 35
A technician accessed a network share from a computer joined to workgroup. The technician logged in as user1 and directed the computer to save the username and password. Several weeks later, the technician wants to log in to this network share using the administrator account. The computer does not prompt for a username and password, but it automatically logs in to the network share under the user1 account.
Which of the following would allow the technician to log in using the administrator username?
- A: Use the command: net use Z: \\fileserver\share
- B: Go to the Sync Center and disable the offline files feature.
- C: Delete the ג€userג€ account for the network share in Credential Manager.
- D: Join the computer and file server to a domain and delegate administrator rights to ג€user1ג€.
- E: Use the Advanced Sharing options in the Network and Sharing Center and enable ג€turn on network discoveryג€.
Question 36
A technician is attempting to repair a Windows computer that is infected with malware. The machine is quarantined but still cannot boot into a standard desktop.
Which of the following is the most likely NEXT step?
- A: Disable System Restore.
- B: Create a restore point.
- C: Apply system updates.
- D: Restart into safe mode.
Question 37
A company has just experienced a data breach that affected all mobile devices.
Which of the following would BEST secure access to user's mobile devices? (Choose two.)
- A: Full device encryption
- B: Remote backup application
- C: SSO authentication
- D: Device profiles update
- E: OS security updates
- F: Biometric authentication
Question 38
A technician is troubleshooting a printer issue on a Windows computer and wants to disable the printer to test a theory.
Which of the following should the technician use to accomplish this?
- A: Devices and Printers
- B: Sync Center
- C: Device Manager
- D: Power Options
Question 39
A technician logs on to a Linux computer and runs the following command: ps -aux | grep vi
Which of the following MOST accurately describes the effect of the command?
- A: It kills any running programs starting with the letters vi.
- B: It opens a list of directories that start with the letters vi.
- C: It creates a new file named grep in the current working directory.
- D: If finds a list of processes running a text editor.
Question 40
A small office calls a technician to investigate some invalid certificate errors from a concerned user. The technician observes that whenever the user attempts to access a secure website from the Windows desktop, this error is encountered. No other users in the office are experiencing this error.
Which of the following should the technician do NEXT? (Choose two.)
- A: Remove any proxy servers configured on the user's browsers.
- B: Assist the user with purchasing an SSL certificate and save the certificate to the desktop.
- C: Disable the SPI firewall on the office's gateway and any other routers.
- D: Instruct the user to ignore the certificate error since the user is connecting to a secure website.
- E: Create an outbound rule in Windows Firewall named after the user's homepage.
- F: Run anti-malware scans and download the latest Windows updates.
Question 41
Following an incident, an administrator is gathering forensic evidence from a server for a human resources investigation.
Which of the following best practices is MOST important to document throughout the process to maintain integrity of the findings?
- A: Acceptable use policy violations
- B: Server configuration
- C: Chain of custody
- D: Data loss incidents
Question 42
A technician is repairing a computer.
Which of the following should the technician do to protect the computer from accidental voltage spikes?
- A: Practice electrical fire safety.
- B: Clean tools properly before use.
- C: Remove any jewelry.
- D: Connect a proper ESD strap.
Question 43
A user's phone contains customer's PII. The user cannot have the phone automatically wiped because the data is very valuable.
Which of the following is the BEST method of securing the phone?
- A: Fingerprint lock
- B: Passcode lock
- C: Swipe lock
- D: PIN lock
Question 44
Which of the following would MOST likely contain troubleshooting guides?
- A: Acceptable use policy
- B: Topology diagram
- C: Knowledge base
- D: Incident documentation
Question 45
A systems administrator needs to add security to the server room.
Which of the following would provide the BEST security for the room? (Choose two.)
- A: Universal serial bus locks
- B: Personal identity verification cards
- C: Privacy screen
- D: Entry control roster
- E: Door locks
- F: Privacy window
Question 46
A network administrator has noticed unusual activity with a user's login credentials on the network. The user is attempting multiple simultaneous login across the network, some of which are attempting to access workstations and servers to which the user does not have access.
Which of the following should the network administrator do NEXT?
- A: Delete the user's AD account.
- B: Decrease the user's AD privileges.
- C: Disable the user's AD account.
- D: Reset the password on the user's AD account.
Question 47
Which of the following encryption methods is used by WPA2 to improve data security as compared to previous wireless encryption protocols?
- A: AES
- B: TKIP
- C: S/MIME
- D: 3DES
Question 48
A user is trying to install a very large .dmg file on a Windows computer but is receiving an error message.
Which of the following is causing the error?
- A: Small hard drive
- B: Insufficient RAM
- C: OS compatibility
- D: Folder permissions
Question 49
A sales representative regularly modifies confidential files on a laptop and needs them to be available all the time. The sales representative will be on a six-month business trip in two weeks. A technician has been asked to assist the sales representative with saving files.
Which of the following is the BEST method to implement to prevent any data loss for the sales representative?
- A: Give the sales representative a USB security lock.
- B: Encrypt the laptop's image on the server.
- C: Create a redundant cloud storage drive.
- D: Give the sales representative an external hard drive.
Question 50
A technician must remove data from the human resources computers. The technician plans to reuse the drives in the computers.
Which of the following data destruction methods should the technician perform to ensure the data is removed completely?
- A: Degaussing
- B: Standard format
- C: Overwrite
- D: Low-level format
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!