220-1202
Free trial
Verified
Question 1
SIMULATION -
You are configuring a home network for a customer. The customer has requested the ability to access a Windows PC remotely, and needs all chat and optional functions to work in their game console.
INSTRUCTIONS -
Use the drop-down menus to complete the network configuration for the customer. Each option may only be used once, and not all options will be used.
Then, click the + sign to place each device in its appropriate location.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Wireless AP LAN -
Firewall Screened Subnet -
Question 2
An administrator received an email stating that the OS they are currently supporting will no longer be issued security updates and patches. Which of the following is most likely the reason the administrator received this message?
- A: Support from the computer’s manufacturer is expiring.
- B: The OS will be considered end of life.
- C: The built-in security software is being removed from the next OS version.
- D: A new version of the OS will be released soon.
Question 3
Which of the following is the best way to distribute custom images to 800 devices that include four device vendor classes with two types of user groups?
- A: Use xcopy to clone the hard drives from one to another.
- B: Use robocopy to move the files to each device.
- C: Use a local image deployment tool for each device.
- D: Use a network-based remote installation tool.
Question 4
Which of the following types of social engineering attacks sends an unsolicited text message to a user's mobile device?
- A: Impersonation
- B: Vishing
- C: Spear phishing
- D: Smishing
Question 5
A user reports some single sign-on errors to a help desk technician. Currently, the user is able to sign in to the company's application portal but cannot access a specific SaaS-based tool. Which of the following would the technician most likely suggest as a next step?
- A: Reenroll the user's mobile device to be used as an MFA token.
- B: Use a private browsing window to avoid local session conflicts.
- C: Bypass single sign-on by directly authenticating to the application.
- D: Reset the device being used to factory defaults.
Question 6
A technician verifies that a malware incident occurred on some computers in a small office. Which of the following should the technician do next?
- A: Quarantine the infected systems.
- B: Educate the end users.
- C: Disable System Restore.
- D: Update the anti-malware and scan the computers.
Question 7
Which of the following is a Linux command that is used for administrative purposes?
- A: runas
- B: cmcl
- C: net user
- D: su
Question 8
A user recently installed an application that accesses a database from a local server. When launching the application, it does not populate any information. Which of the following command-line tools is the best to troubleshoot the issue?
- A: ipconfig
- B: nslookup
- C: netstat
- D: curl
Question 9
A small office reported a phishing attack that resulted in a malware infection. A technician is investigating the incident and has verified the following:
All endpoints are updated and have the newest EDR signatures.
Logs confirm that the malware was quarantined by EDR on one system.
The potentially infected machine was reimaged.
Which of the following actions should the technician take next?
- A: Install network security tools to prevent downloading infected files from the internet.
- B: Discuss the cause of the issue and educate the end user about security hygiene.
- C: Flash the firmware of the router to ensure the integrity of network traffic.
- D: Suggest alternate preventative controls that would include more advanced security software.
Question 10
Which of the following describes a vulnerability that has been exploited before a patch or remediation is available?
- A: Spoofing
- B: Brute-force
- C: DoS
- D: Zero-day
Question 11
SIMULATION -
You have been contacted through the help desk chat application. A user is setting up a replacement SOHO router. Assist the user with setting up the router.
INSTRUCTIONS -
Select the most appropriate statement for each response. Click the send button after each response to continue the chat.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Question 12
A technician needs to provide remote support for a legacy Linux-based operating system from their Windows laptop. The solution needs to allow the technician to see what the user is doing and provide the ability to interact with the user's session. Which of the following remote access technologies would support the use case?
- A: VPN
- B: VNC
- C: SSH
- D: RDP
Question 13
A help desk technician is setting up speech recognition on a Windows system. Which of the following settings should the technician use?
- A: Time and Language
- B: Personalization
- C: System
- D: Ease of Access
Question 14
A user receives a new personal computer but is unable to run an application. An error displays saying that .NET Framework 3.5 is required and not found. Which of the following actions is the best way to resolve this issue?
- A: Resolve the dependency through the "Turn Windows features on or off" menu.
- B: Download the dependency via a third-party repository.
- C: Ignore the dependency and install the latest version 4 instead.
- D: Forward the trouble ticket to the SOC team because the issue poses a great security risk.
Question 15
An employee is using a photo editing program. Certain features are disabled and require a log-in, which the employee does not have. Which of the following is a way to resolve this issue?
- A: License assignment
- B: VPN connection
- C: Application repair
- D: Program reinstallation
Question 16
A technician is deploying mobile devices and needs to prevent access to sensitive data if the devices are lost. Which of the following is the best way to prevent unauthorized access if the user is unaware that the phone is lost?
- A: Encryption
- B: Remote wipe
- C: Geofencing
- D: Facial recognition
That’s the end of your free questions
You’ve reached the preview limit for 220-1202Consider upgrading to gain full access!
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!