Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
220-1102
Free trial
Verified
Question 26
A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore. Which of the following would BEST accomplish this task?
- A: Differential backup
- B: Off-site backup
- C: Incremental backup
- D: Full backup
Question 27
A technician receives a call from a user who is on vacation. The user provides the necessary credentials and asks the technician to log in to the user's account and read a critical email that the user has been expecting. The technician refuses because this is a violation of the:
- A: acceptable use policy.
- B: regulatory compliance requirements.
- C: non-disclosure agreement.
- D: incident response procedures.
Question 28
A technician received a call stating that all files in a user's documents folder appear to be changed, and each of the files now has a .lock file extension. Which of the following actions is the FIRST step the technician should take?
- A: Run a live disk clone.
- B: Run a full antivirus scan.
- C: Use a batch file to rename the files.
- D: Disconnect the machine from the network.
Question 29
A user is attempting to browse the internet using Internet Explorer. When trying to load a familiar web page, the user is unexpectedly redirected to an unfamiliar website. Which of the following would MOST likely solve the issue?
- A: Updating the operating system
- B: Changing proxy settings
- C: Reinstalling the browser
- D: Enabling port forwarding
Question 30
An administrator has submitted a change request for an upcoming server deployment. Which of the following must be completed before the change can be approved?
- A: Risk analysis
- B: Sandbox testing
- C: End user acceptance
- D: Lessons learned
Question 31
A macOS user reports seeing a spinning round cursor on a program that appears to be frozen. Which of the following methods does the technician use to force the program to close in macOS?
- A: The technician presses the Ctrl+Alt+Del keys to open the Force Quit menu, selects the frozen application in the list, and clicks Force Quit.
- B: The technician clicks on the frozen application and presses and holds the Esc key on the keyboard for 10 seconds which causes the application to force quit.
- C: The technician opens Finder, navigates to the Applications folder, locates the application that is frozen in the list, right-clicks on the application, and selects the Force Quit option.
- D: The technician opens the Apple icon menu, selects Force Quit, selects the frozen application in the list, and clicks Force Quit.
Question 32
A technician is tasked with configuring a computer for a visually impaired user. Which of the following utilities should the technician use?
- A: Device Manager
- B: System
- C: Ease of Access Center
- D: Programs and Features
Question 33
A user received the following error upon visiting a banking website:
The security certificate presented by this website was issued for a different website's address.
A technician should instruct the user to:
- A: clear the browser cache and contact the bank.
- B: close out of the site and contact the bank.
- C: continue to the site and contact the bank
- D: update the browser and contact the bank.
Question 34
A technician suspects a rootkit has been installed and needs to be removed. Which of the following would BEST resolve the issue?
- A: Application updates
- B: Anti-malware software
- C: OS reinstallation
- D: File restore
Question 35
A technician connects an additional monitor to a PC using a USB port. The original HDMI monitor is mounted to the left of the new monitor. When moving the mouse to the right from the original monitor to the new monitor, the mouse stops at the end of the screen on the original monitor. Which of the following will allow the mouse to correctly move to the new monitor?
- A: Rearranging the monitor's position in display settings
- B: Swapping the cables for the monitors
- C: Using the Ctrl+Alt+=> to correct the display orientation
- D: Updating the display drivers for the video card
Question 36
A user is unable to use any internet-related functions on a smartphone when it is not connected to Wi-Fi. When the smartphone is connected to Wi-Fi, the user can browse the internet and send and receive email. The user is also able to send and receive text messages and phone calls when the smartphone is not connected to Wi-Fi. Which of the following is the MOST likely reason the user is unable to use the internet on the smartphone when it is not connected to Wi-Fi?
- A: The smartphone's line was not provisioned with a data plan
- B: The smartphone's SIM card has failed.
- C: The smartphone's Bluetooth radio is disabled
- D: The smartphone has too many applications open
Question 37
A help desk technician runs the following script: Inventory.py. The technician receives the following error message:
How do you want to open this file?
Which of the following is the MOST likely reason this script is unable to run?
- A: Scripts are not permitted to run.
- B: The script was not built for Windows.
- C: The script requires administrator privileges.
- D: The runtime environment is not installed.
Question 38
A company discovered that numerous computers from multiple geographic locations are sending a very high number of connection requests which is causing the company’s web server to become unavailable to the general public. Which of the following attacks is occurring?
- A: Zero day
- B: SQL injection
- C: Cross-site scripting
- D: Distributed denial of service
Question 39
A technician suspects the boot disk of a user’s computer contains bad sectors. Which of the following should the technician verify in the command prompt to address the issue without making any changes?
- A: Run sfc / scannow on the drive as the administrator
- B: Run cleanmgr on the drive as the administrator
- C: Run chkdsk on the drive as the administrator
- D: Run dfrgui on the drive as the administrator
Question 40
A BSOD appears on a user’s workstation monitor. The user immediately presses the power button to shut down the PC, hoping to repair the issue. The user then restarts the PC, and the BSOD reappears, so the user contacts the help desk. Which of the following should the technician use to determine the cause?
- A: Stop code
- B: Event Viewer
- C: Services
- D: System Configuration
Question 41
Which of the following is the STRONGEST wireless configuration?
- A: WPS
- B: WPA3
- C: WEP
- D: WMN
Question 42
A technician is installing new network equipment in a SOHO and wants to ensure the equipment is secured against external threats on the Internet. Which of the following actions should the technician do FIRST?
- A: Lock all devices in a closet.
- B: Ensure all devices are from the same manufacturer.
- C: Change the default administrative password.
- D: Install the latest operating system and patches.
Question 43
While assisting a customer with an issue, a support representative realizes the appointment is taking longer than expected and will cause the next customer meeting to be delayed by five minutes. Which of the following should the support representative do NEXT?
- A: Send a quick message regarding the delay to the next customer.
- B: Cut the current customer's time short and rush to the next customer.
- C: Apologize to the next customer when arriving late.
- D: Arrive late to the next meeting without acknowledging the time.
Question 44
A user connected a laptop to a wireless network and was tricked into providing log-in credentials for a website. Which of the following threats was used to carry out the attack?
- A: Zero day
- B: Vishing
- C: DDoS
- D: Evil twin
Question 45
A technician is setting up a SOHO wireless router. The router is about ten years old. The customer would like the most secure wireless network possible. Which of the following should the technician configure?
- A: WPA2 with TKIP
- B: WPA2 with AES
- C: WPA3 with AES-256
- D: WPA3 with AES-128
Question 46
A new service desk is having a difficult time managing the volume of requests. Which of the following is the BEST solution for the department?
- A: Implementing a support portal
- B: Creating a ticketing system
- C: Commissioning an automated callback system
- D: Submitting tickets through email
Question 47
Which of the following Linux commands would be used to install an application?
- A: yum
- B: grep
- C: ls
- D: sudo
Question 48
A network administrator is deploying a client certificate to be used for Wi-Fi access for all devices in an organization. The certificate will be used in conjunction with the user's existing username and password. Which of the following BEST describes the security benefits realized after this deployment?
- A: Multifactor authentication will be forced for Wi-Fi.
- B: All Wi-Fi traffic will be encrypted in transit.
- C: Eavesdropping attempts will be prevented.
- D: Rogue access points will not connect.
Question 49
A user in a corporate office reports the inability to connect to any network drives. No other users have reported this issue. Which of the following is the MOST likely reason the user is having this issue?
- A: The user is not connected to the VPN.
- B: The file server is offline.
- C: A low battery is preventing the connection.
- D: The log-in script failed.
Question 50
A user reports a PC is running slowly. The technician suspects high disk I/O. Which of the following should the technician perform NEXT?
- A: resmon.exe
- B: msconfig.exe
- C: dfrgui.exe
- D: msinfo32.exe
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!