Spring Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

220-1202 Questions and Answers

Question # 6

A technician is using a credential manager to safeguard a large number of credentials. Which of the following is important for using this application?

A.

Restricted log-in times

B.

Secure master password

C.

TPM module

D.

Windows lock screen

Full Access
Question # 7

Performance on a user’s smartphone is degrading. Applications take a long time to start, and switching between windows also takes a long time. Which of the following diagnostic steps should a mobile technician take first?

A.

Restore the phone to factory settings

B.

Restart the phone

C.

Check the phone’s battery state

D.

Uninstall unneeded applications

Full Access
Question # 8

A Windows 11 Home device is receiving constant pop-ups about an urgent need to update antivirus software to remove a detected threat. The user has been clicking the "X" button in the window frame but it always reappears. The pop-up includes an "OK" button to install the update and remove the threat. Which of the following should the user do next?

A.

Click the "OK" button to install the update

B.

Reinstall the Windows Operating System

C.

Run System File Checker

D.

Verify the current status and settings of protection measures

Full Access
Question # 9

An administrator is investigating a technical outage. The management team wants information that includes the summary of the outage and actions taken. Which of the following documentation should the administrator provide to the management team?

A.

Knowledge base article

B.

Non-disclosure agreement

C.

Incident report

D.

Standard operating procedure

Full Access
Question # 10

A technician is assigned to offboard a user. Which of the following are common tasks on an offboarding checklist? (Choose two.)

A.

Quarantine the hard drive in the user's laptop.

B.

Deactivate the user's key fobs for door access.

C.

Purge all PII associated with the user.

D.

Suspend the user's email account.

E.

Turn off the network ports underneath the user's desk.

F.

Add the MAC address of the user's computer to a blocklist.

Full Access
Question # 11

A user created a document using online collaboration tools, and the document is not available on their laptop now. Which of the following should a desktop technician do to remediate the issue?

A.

Synchronize the remote folder with the user’s laptop.

B.

Download the file and send it to the user using instant messaging.

C.

Install word processing tools on the user’s laptop.

D.

Connect the user’s laptop to Wi-Fi.

Full Access
Question # 12

A company wants to prevent unauthorized physical access to its mobile devices. Which of the following should the company do? (Select two).

A.

Disable built-in hotspots.

B.

Configure VPN software.

C.

Install an antivirus application.

D.

Use PIN authentication.

E.

Turn on location services.

F.

Enable screen timeout.

Full Access
Question # 13

After a recent mobile OS upgrade to a smartphone, a user attempts to access their corporate email, but the application does not open. A technician restarts the smartphone, but the issue persists. Which of the following is the most likely way to resolve the issue?

A.

Updating the failed software

B.

Registering the smartphone with an MDM solution

C.

Installing a third-party client

D.

Clearing the cache partition

Full Access
Question # 14

After a technician upgrades the RAM on a user's workstation, the system shows a “No boot device found” message. Which of the following is most likely the cause?

A.

The installation disk is not available

B.

The SATA HDD power cable is disconnected

C.

The drive needs to be reformatted

D.

The boot order needs to be changed

Full Access
Question # 15

A client reports that their browser's home page changed. Every time they run an internet search, the results are returned from unfamiliar websites. Which of the following actions should a technician take first to resolve the issue? (Select two)

A.

Clear the browsing history

B.

Run operating system updates

C.

Check the system date and time

D.

Uninstall malicious extensions

E.

Reset browser startup page

F.

Restart the user's machine

Full Access
Question # 16

A user reports that double-clicking an application's shortcut fails to launch the program. A technician believes the application process is running in the background in an unresponsive state. Which of the following tools should the technician use to resolve the issue?

A.

Resource Monitor

B.

Task Manager

C.

Event Viewer

D.

Registry Editor

Full Access
Question # 17

Welcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

INSTRUCTIONS

Click on individual tickets to see the ticket details, and view applicable attachments to

determine the problem.

Select the appropriate issue from the 'Issue' drop-down menu. Then, select the most

efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper

command or verification to remediate or confirm your fix of the issue from the

'Verify/Resolve' drop-down menu.

Full Access
Question # 18

A user’s computer is running slowly. Task Manager shows:

Disk: 2%

Network: 12%

GPU: 15%

CPU: 70%

Memory: 97%

Which of the following would a technician most likely do to resolve the issue?

A.

Clear browser cached data

B.

Upgrade the network connection

C.

Close unnecessary programs

D.

Delete temporary files

Full Access
Question # 19

When a corporate laptop is connected to the company network, it can reach external websites. However, it cannot reach any internal websites, displaying the error message “Cannot reach this page.” Which of the following should a technician configure?

A.

Subnet mask

B.

DNS settings

C.

Default gateway

D.

DHCP

Full Access
Question # 20

A desktop technician is mapping a remote Windows share \\WinNAS\shared as local drive Z:. Which command should the technician run?

A.

nslookup -opt 3: \WinNAS\shared

B.

net use 3: \WinNAS\shared

C.

chkdsk /R 2: \WinNAS\shared

D.

sfc /offwindir 3: \WinNAS\shared

Full Access
Question # 21

A technician needs to prevent accidental access to Wi-Fi networks available in a shared office space. The BYOD and company-owned devices already have Wi-Fi settings configured via MDM solutions. Which of the following settings should the technician change?

A.

IP filtering configuration

B.

SSID configuration

C.

Content filtering configuration

D.

Port forwarding/mapping

Full Access
Question # 22

An end user wants to have a sales printer added to their computer. The printer is on the domain. Which of the following is the best method for the technician to add the printer?

A.

Go to the print server and select the printer name

B.

Connect the laptop to the printer via USB

C.

Connect to the printer via Bluetooth

D.

Go to Local Users and Groups to add the printer

Full Access
Question # 23

A user logs in to a computer each morning and tries to print a daily report, but it will not print. The help desk resolves the issue each day temporarily. To fix this permanently, which of the following should the technician do? (Select two)

A.

Set the print spooler to have no dependencies

B.

Set the print spooler recovery to take no action

C.

Start the printer extensions and notifications service

D.

Start the print spooler service

E.

Set the print spooler to Automatic

F.

Set the print spooler log-on to the user's account

Full Access
Question # 24

Company employees do not have assigned workspaces and regularly work at different computers and physical locations. Which of the following should the company implement to maintain data security and minimize the amount of user data that needs to be transferred?

A.

Centralized certificate storage

B.

Cloud email

C.

Portable drives

D.

Roaming profiles

Full Access
Question # 25

A technician is working on multiple remote machines using a command line. Which of the following commands should the technician use to verify which SMB shares are currently mapped?

A.

systeminfo

B.

hostname

C.

net use

D.

nslookup

Full Access
Question # 26

A technician needs to install Windows 11 on a 4TB SSD. The company requires that the drive be partitioned with at least five primary partitions. Which of the following should the technician use? (Select two).

A.

FAT16

B.

XFS

C.

GPT

D.

MBR

E.

NTFS

F.

APFS

Full Access
Question # 27

Due to recent security issues, the finance department requires a shorter screensaver timeout. Which of the following should a technician use to accomplish this task?

A.

gpedit.msc

B.

certmgr.msc

C.

devmgmt.msc

D.

perfmon.msc

Full Access
Question # 28

A company's IT department discovers that unauthorized software has been installed on several workstations. The IT manager requests a review and an update of the workstation security posture, focusing on preventing future unauthorized software installations. Which of the following should the company do?

A.

Remove account administrative rights

B.

Turn on the workstation firewall

C.

Enable Windows Defender SmartScreen

D.

Install EDR on all devices

Full Access
Question # 29

A user takes an iOS-based smartphone that is performing slowly to a repair shop. A shop technician finds the following information:

Battery charge: 25%

Battery health: 90%

Hot-spot: On

Mobile reception: |||

Roaming: Off

Used space: 63.76GB/64GB

Which of the following is the cause of the issue?

A.

The device is running out of free space

B.

The battery health is low

C.

The phone is not sufficiently charged

D.

The hotspot is degrading the performance

E.

Too many applications are open

Full Access
Question # 30

Technicians are failing to document user contact information, device asset tags, and a clear description of each issue in the ticketing system. Which of the following should a help desk management team implement for technicians to use on every call?

A.

Service-level agreements

B.

Call categories

C.

Standard operating procedures

D.

Knowledge base articles

Full Access
Question # 31

A support specialist needs to decide whether to install a 32-bit or 64-bit OS architecture on a new computer. Which of the following specifications will help the specialist determine which OS architecture to use?

A.

16GB RAM

B.

Intel i7 CPU

C.

500GB HDD

D.

1Gbps Ethernet

Full Access
Question # 32

A technician wants to create new partitions on a device so that a user can keep work data and personal data separate. Which of the following tools should the technician use?

A.

perfmon.msc

B.

diskmgmt.msc

C.

lusrmgr.msc

D.

devmgmt.msc

Full Access
Question # 33

A user wants to connect a retro gaming console to the internet so that they can participate in online gaming. In order for the console to work, the Wi-Fi connection must adhere to a WPA-protected broadcast. Which of the following is the best option for the user to implement?

A.

Create a lower-security network exclusively for the console

B.

Set the router to WPA and then back to normal after using the console

C.

Use a wired Ethernet adapter to connect the console

D.

Connect an older wireless router to the existing network

Full Access
Question # 34

Which of the following security measures addresses the issue of information exfiltration?

A.

DLP

B.

MDM

C.

SAML

D.

IAM

Full Access
Question # 35

A customer is unable to open some files on their system. Each time the customer attempts to open a file, the customer receives a message that the file is encrypted. Which of the following best describes this issue?

A.

Keylogger

B.

Ransomware

C.

Phishing

D.

Cryptominer

Full Access
Question # 36

Which of the following depends on system time accuracy to function properly?

A.

Terminal Access Controller Access-control System

B.

Kerberos token

C.

Remote Authentication Dial-in User Service

D.

Wi-Fi Protected Access

Full Access
Question # 37

Various alerts on a user's Windows 11 laptop are continually interrupting videoconference calls. Which of the following should a support technician recommend to best solve the issue?

A.

Use multiple sound output devices for the various source applications

B.

Disable all notifications in different applications in the order they appear

C.

Configure the Sounds option in Control Panel to be set to No Sounds

D.

Set Windows Notifications settings to Do Not Disturb

Full Access
Question # 38

Which of the following prevents forced entry into a building?

A.

PIV card

B.

Motion-activated lighting

C.

Video surveillance

D.

Bollard

Full Access
Question # 39

An administrator received an email stating that the OS they are currently supporting will no longer be issued security updates and patches. Which of the following is most likely the reason the administrator received this message?

A.

Support from the computer's manufacturer is expiring

B.

The OS will be considered end of life

C.

The built-in security software is being removed from the next OS version

D.

A new version of the OS will be released soon

Full Access
Question # 40

An administrator received an email stating that the OS they are currently supporting will no longer be issued security updates and patches. Which of the following is most likely the reason the administrator received this message?

A.

Support from the computer’s manufacturer is expiring

B.

The OS will be considered end of life

C.

The built-in security software is being removed from the next OS version

D.

A new version of the OS will be released soon

Full Access
Question # 41

A user reports that after a recent software deployment to upgrade the Testing application, they can no longer use it. However, other employees can successfully

use the Testing program.

INSTRUCTIONS

Review the information in each tab to verify the results of the deployment and resolve

any issues discovered by selecting the:

· First command to resolve the issue

· Second command to resolve the issue

Full Access
Question # 42

You have been contacted through the help desk chat application. A user is setting up a replacement SOHO router. Assist the user with setting up the router.

INSTRUCTIONS

Select the most appropriate statement for each response. Click the send button after each response to continue the chat.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access